Lucene search

K
cveTalosCVE-2023-24019
HistoryJul 06, 2023 - 3:15 p.m.

CVE-2023-24019

2023-07-0615:15:11
CWE-120
CWE-787
talos
web.nvd.nist.gov
22
cve-2023-24019
stack-based buffer overflow
milesight ur32l
ur32l v32.3.0.5
network packet
buffer overflow vulnerability

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0.002

Percentile

52.5%

A stack-based buffer overflow vulnerability exists in the urvpn_client http_connection_readcb functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.

Affected configurations

Nvd
Vulners
Node
milesightur32l_firmwareMatch32.3.0.5
AND
milesightur32lMatch-
VendorProductVersionCPE
milesightur32l_firmware32.3.0.5cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*
milesightur32l-cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Milesight",
    "product": "UR32L",
    "versions": [
      {
        "version": "v32.3.0.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0.002

Percentile

52.5%

Related for CVE-2023-24019