Lucene search

K
cve[email protected]CVE-2023-1163
HistoryMar 03, 2023 - 7:15 a.m.

CVE-2023-1163

2023-03-0307:15:09
CWE-22
web.nvd.nist.gov
20
vulnerability
draytek vigor 2960
path traversal
critical
nvd
cve-2023-1163

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.1%

UNSUPPORTED WHEN ASSIGNED A vulnerability has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5 and classified as critical. Affected by this vulnerability is the function getSyslogFile of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222259. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Affected configurations

Vulners
NVD
Node
draytekvigor_2960Match1.5.1.4
OR
draytekvigor_2960Match1.5.1.5
VendorProductVersionCPE
draytekvigor_29601.5.1.4cpe:2.3:h:draytek:vigor_2960:1.5.1.4:*:*:*:*:*:*:*
draytekvigor_29601.5.1.5cpe:2.3:h:draytek:vigor_2960:1.5.1.5:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "DrayTek",
    "product": "Vigor 2960",
    "versions": [
      {
        "version": "1.5.1.4",
        "status": "affected"
      },
      {
        "version": "1.5.1.5",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Management Interface"
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.1%

Related for CVE-2023-1163