Lucene search

K
cve[email protected]CVE-2023-1617
HistoryApr 14, 2023 - 12:15 p.m.

CVE-2023-1617

2023-04-1412:15:07
CWE-287
web.nvd.nist.gov
26
2
cve-2023-1617
improper authentication
b&r industrial automation
vc4
vnc-server
network security
vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.0%

Improper Authentication vulnerability in B&R Industrial Automation B&R VC4 (VNC-Server modules).  This vulnerability may allow an unauthenticated network-based attacker to bypass the authentication mechanism of the VC4 visualization on affected devices. The impact of this vulnerability depends on the functionality provided in the visualization.
This issue affects B&R VC4: from 3.* through 3.96.7, from 4.0* through 4.06.7, from 4.1* through 4.16.3, from 4.2* through 4.26.8, from 4.3* through 4.34.6, from 4.4* through 4.45.1, from 4.5* through 4.45.3, from 4.7* through 4.72.9.

Affected configurations

NVD
Node
br-automationvc4Range<3.96.8
OR
br-automationvc4Range4.0.04.06.4
OR
br-automationvc4Range4.10.04.16.3
OR
br-automationvc4Range4.20.04.26.8
OR
br-automationvc4Range4.30.04.34.7
OR
br-automationvc4Range4.40.04.45.1
OR
br-automationvc4Range4.50.04.53.0
OR
br-automationvc4Range4.70.04.73.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "VNC-Server"
    ],
    "product": "B&R VC4",
    "vendor": "B&R Industrial Automation",
    "versions": [
      {
        "lessThanOrEqual": "3.96.7",
        "status": "affected",
        "version": "3.*",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "4.06.7",
        "status": "affected",
        "version": "4.0*",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "4.16.3",
        "status": "affected",
        "version": "4.1*",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "4.26.8",
        "status": "affected",
        "version": "4.2*",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "4.34.6",
        "status": "affected",
        "version": "4.3*",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "4.45.1",
        "status": "affected",
        "version": "4.4*",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "4.45.3",
        "status": "affected",
        "version": "4.5*",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "4.72.9",
        "status": "affected",
        "version": "4.7*",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.0%

Related for CVE-2023-1617