mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
462 lines
13 KiB
JSON
462 lines
13 KiB
JSON
{
|
|
"id": "CVE-2023-6448",
|
|
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"published": "2023-12-05T18:15:12.643",
|
|
"lastModified": "2023-12-19T14:15:07.183",
|
|
"vulnStatus": "Modified",
|
|
"cisaExploitAdd": "2023-12-11",
|
|
"cisaActionDue": "2023-12-18",
|
|
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
"cisaVulnerabilityName": "Unitronics Vision PLC and HMI Insecure Default Password Vulnerability",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los PLC y HMI de Unitronics Vision Series utilizan contrase\u00f1as administrativas predeterminadas. Un atacante no autenticado con acceso a la red de un PLC o HMI puede tomar el control administrativo del sistema."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-798"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-1188"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision1210_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "77C7A79D-4EFE-41C2-88E9-F9A1A65C4D6E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision1210:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32D6EFD3-61C3-4C4D-8B17-16591255EAE5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision1040_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48A0D42D-7A8D-457F-A5CD-86B51893F692"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision1040:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C91F4803-BC61-491F-9561-ECF043253B04"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision700_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB10EB4D-BDBE-47FF-9F10-60B5CB35D900"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision700:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38C892EC-1980-459E-9B1F-E9F0C703E758"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision570_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13F59B69-E4F7-44D5-8B98-953DCAE8DA4C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision570:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "017A743B-AB98-4931-B7D6-F1062529B947"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision560_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "277889A8-0A02-4623-ABB6-02EEBAD2C444"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision560:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E24B3A0-2FD9-4C13-9E89-F218B9CCED7C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision430_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "426B5B56-9B45-4B35-AE11-5BFE105A442F"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision430:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A078DEE-DB79-4E33-BF48-849D6A26F0FC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision350_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BE0058F-1D67-4911-8851-5C1A2DD37028"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision350:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "406D6FA9-4C05-4612-811E-A32E4516EBC1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision130_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD5FEF72-265B-49A4-96F2-C92AEC8CA4D4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision130:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49A6FC0D-8687-4563-9C38-5AF0DCC46926"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision230_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "96B4A225-6384-4C80-B3F5-441095EB8D01"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision230:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C360B7F4-9FDB-4143-87A0-1006C7C3A39C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision280_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0DAF7F8-CAF7-4C94-BE4A-680FDA6A7700"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision280:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "519F0192-4F48-4954-BAE1-8DC74BC0C017"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision290_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C25C3B0-0521-433C-B63A-39021BDCE9A1"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision290:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66A05131-B264-4858-A533-CBA5E229D40D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision530_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B9FC8CD-6413-42C6-9A36-B3BE5DB7F044"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision530:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A2DAADD-AD0E-43C5-B3CB-2F5445235C4F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:unitronics:vision120_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B42157C-52B2-4CBA-8946-DF74517CE9CC"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:unitronics:vision120:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF245A2D-9C93-41C2-AD88-8B2ABA026D5B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf",
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
|
},
|
|
{
|
|
"url": "https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf",
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
|
},
|
|
{
|
|
"url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems",
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.unitronicsplc.com/cyber_security_vision-samba/",
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
|
}
|
|
]
|
|
} |