mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
363 lines
13 KiB
JSON
363 lines
13 KiB
JSON
{
|
|
"id": "CVE-2023-35085",
|
|
"sourceIdentifier": "support@hackerone.com",
|
|
"published": "2023-08-10T19:15:09.730",
|
|
"lastModified": "2024-11-21T08:07:56.790",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).\n\n \n\nAffected Products:\nAll UniFi Access Points (Version 6.5.50 and earlier)\nAll UniFi Switches (Version 6.5.32 and earlier) \n-USW Flex Mini excluded.\n \n\nMitigation:\nUpdate UniFi Access Points to Version 6.5.62 or later.\nUpdate the UniFi Switches to Version 6.5.59 or later."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "support@hackerone.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
"baseScore": 9.0,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 6.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-190"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:ui:unifi_uap_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "6.5.50",
|
|
"matchCriteriaId": "2E2686D1-9EC2-4C0A-BA4E-B28F57B054C8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6\\+:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2CE9DEA-F0FD-4A8E-98AB-36F87C40F1F5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6-enterprise:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1020447C-93FA-42D6-BA01-D1AE08B25C2D"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6-enterprise-iw:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76254C68-9B4A-4235-8E33-57258EDD5AA0"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6-extender:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0CDC687A-C0E1-4F77-AA16-963BE9CDBC3C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6-iw:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2640C955-4707-4C41-821D-C5A6167B2856"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6-lite:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8D6010F-39B5-4035-BCFA-3EC40BFED5CF"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6-lr:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "573BC349-D7EA-4F64-83C3-A0402D8D8AD1"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6-mesh:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5986D778-24F3-4972-92FC-AAF2ECF8FAFA"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:u6-pro:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F230AF7-CF0B-4F3A-A536-D25DB9DA52E0"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:uap-ac-iw:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D055A30-7260-4548-A53E-A494FEE18E7F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:uap-ac-lite:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C591F57C-0162-4B8F-BA1A-AAA154065D4B"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:uap-ac-lr:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6F7A9AF-67ED-4AB0-86CB-B6386566CB6A"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:uap-ac-m:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B27159DB-E6FC-494F-B5E1-C2C6B5EC1FCC"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:uap-ac-m-pro:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB265A14-6E1F-498B-9D0E-DE91F1155C69"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:uap-ac-pro:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "46FD9619-1620-41ED-9B2F-14DBD468744F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:ubb:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E6480788-66E3-496A-B1D8-4A190E5D2222"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:ubb-xg:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F840F091-FA53-4F41-9DDE-F00C0C377EC5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:uwb-xg:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10E8DBA7-B43B-4EA7-A8AC-AC50AA4714F6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:ui:unifi_switch_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "6.5.32",
|
|
"matchCriteriaId": "08AC707B-15BA-4E28-9986-372DE2389074"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:us-16-150w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD780EAB-CA86-4CC7-9D80-63AC898422D8"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:us-24-250w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3EE87B72-7316-4CA9-BC9B-0CA62D48D82E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:us-48-500w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "45AFD894-70FC-4E9A-B4C4-E3785C4A3479"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:us-8-150w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4D3F7DA-B5A1-4AE9-9E29-468618F7EF50"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:us-8-60w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F043681-EE08-4D84-9C04-DF38526261E7"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:us-xg-6poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E973806-9CF3-4FFD-8F11-EB269802C8FB"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-16-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F0546CAF-C129-4851-8F11-643210ED412F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-24:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4AEC37C-535D-4D91-A5E7-E5279A633019"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-24-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C462A08D-BDFA-48B4-BEAF-08CEB150B059"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-48:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3FD64A71-56FF-4085-AF6C-15EA0F6E8378"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-48-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "685D1F65-83D4-4B17-B32E-7ACE6DC5369A"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-aggregation:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6125A5E-9951-4563-990A-4E650CDC9B98"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-enterprise-24-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "724A3C35-8CCF-4A20-A007-9BDF95940892"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-enterprise-48-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "418FFCA4-3818-4F4D-85F6-1458380D459F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-enterprise-8-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E0A4E44-97FB-4B58-8032-B37B2841C053"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-enterprisexg-24:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44744D4A-C95F-4404-941E-58C8F2FD215E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-flex:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8380E3AB-B7CA-4383-A69B-A9035975C6C5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-flex-xg:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "140D2FF7-F27D-4DE5-A282-D7C142A767FC"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-industrial:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF462DED-B7F7-48F4-BB0D-07CD0F967CC9"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-lite-16-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C81323E8-B673-4583-8D95-54305AA0BF22"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-lite-8-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE6FF084-A010-42D8-B825-3B9148EBF20D"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-mission-critical:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20BC9784-AFE7-4D26-AC04-43F81400D839"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-pro-24:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84A4E1C5-D11A-42A4-A7E5-E155BF12D7E9"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-pro-24-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05C14A48-3695-425E-9E3E-FD6C9025564F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-pro-48:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "318EA276-9F4D-4963-AE6B-A73EC6239C29"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-pro-48-poe:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7AB243A-FAF3-487C-AAAC-9B5895736EAB"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:ui:usw-pro-aggregation:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85F5CCEF-45DC-4EF6-83AB-FCFE60BFFF4D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56",
|
|
"source": "support@hackerone.com",
|
|
"tags": [
|
|
"Issue Tracking",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Issue Tracking",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |