mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
60 lines
2.9 KiB
JSON
60 lines
2.9 KiB
JSON
{
|
|
"id": "CVE-2024-2103",
|
|
"sourceIdentifier": "security@selinc.com",
|
|
"published": "2024-04-04T16:15:08.650",
|
|
"lastModified": "2024-04-04T16:33:06.610",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "\nInclusion of undocumented features vulnerability accessible when logged on with a privileged access level on the following Schweitzer Engineering Laboratories relays could allow the relay to behave unpredictably:\nSEL-700BT Motor Bus Transfer Relay, SEL-700G Generator Protection Relay, SEL-710-5 Motor Protection Relay, SEL-751 Feeder Protection Relay, SEL-787-2/-3/-4 Transformer Protection Relay, SEL-787Z High-Impedance Differential Relay\n\n. See product instruction manual appendix A dated 20240308 for more details regarding the SEL-751 Feeder Protection Relay. For more information for the other affected products, see their instruction manuals dated 20240329.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La inclusi\u00f3n de vulnerabilidades de caracter\u00edsticas no documentadas accesibles al iniciar sesi\u00f3n con un nivel de acceso privilegiado en los siguientes rel\u00e9s de Schweitzer Engineering Laboratories podr\u00eda permitir que el rel\u00e9 se comporte de manera impredecible: Rel\u00e9 de transferencia de bus de motor SEL-700BT, Rel\u00e9 de protecci\u00f3n de generador SEL-700G, Motor SEL-710-5 Rel\u00e9 de protecci\u00f3n, Rel\u00e9 de protecci\u00f3n de alimentador SEL-751, Rel\u00e9 de protecci\u00f3n de transformador SEL-787-2/-3/-4, Rel\u00e9 diferencial de alta impedancia SEL-787Z. Consulte el ap\u00e9ndice A del manual de instrucciones del producto con fecha 20240308 para obtener m\u00e1s detalles sobre el rel\u00e9 de protecci\u00f3n del alimentador SEL-751. Para obtener m\u00e1s informaci\u00f3n sobre los dem\u00e1s productos afectados, consulte sus manuales de instrucciones con fecha 20240329."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@selinc.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.2
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@selinc.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-1242"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://selinc.com/support/security-notifications/external-reports/",
|
|
"source": "security@selinc.com"
|
|
}
|
|
]
|
|
} |