An unauthenticated remote attacker can force authenticated users to perform unauthorized actions by viewing logs, granting privilege escalation
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2023-22300 CVE-2023-22300 | 27 Mar 202319:36 | – | vulnrichment |
![]() | CVE-2023-22300 CVE-2023-22300 | 27 Mar 202319:36 | – | cvelist |
![]() | Privilege escalation | 27 Mar 202320:15 | – | prion |
![]() | CVE-2023-22300 | 27 Mar 202320:15 | – | nvd |
![]() | SAUTER EY-modulo 5 Building Automation Stations | 3 Apr 202319:38 | – | ics |
[
{
"vendor": "SAUTER",
"product": "EY-AS525F001 with moduWeb",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
}
]
Source | Link |
---|---|
cisa | www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo