Lucene search

K
cve[email protected]CVE-2023-30899
HistoryMay 09, 2023 - 1:15 p.m.

CVE-2023-30899

2023-05-0913:15:18
CWE-502
web.nvd.nist.gov
11
cve-2023-30899
siveillance video
remote code execution
vulnerability
nvd
management server
deserialization

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

8.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.6%

A vulnerability has been identified in Siveillance Video 2020 R2 (All versions < V20.2 HotfixRev14), Siveillance Video 2020 R3 (All versions < V20.3 HotfixRev12), Siveillance Video 2021 R1 (All versions < V21.1 HotfixRev12), Siveillance Video 2021 R2 (All versions < V21.2 HotfixRev8), Siveillance Video 2022 R1 (All versions < V22.1 HotfixRev7), Siveillance Video 2022 R2 (All versions < V22.2 HotfixRev5), Siveillance Video 2022 R3 (All versions < V22.3 HotfixRev2), Siveillance Video 2023 R1 (All versions < V23.1 HotfixRev1). The Management Server component of affected applications deserializes data without sufficient validations. This could allow an authenticated remote attacker to execute code on the affected system.

Affected configurations

NVD
Node
siemenssiveillance_videoMatch2020r2
OR
siemenssiveillance_videoMatch2020r3
OR
siemenssiveillance_videoMatch2021r1
OR
siemenssiveillance_videoMatch2021r2
OR
siemenssiveillance_videoMatch2022r1
OR
siemenssiveillance_videoMatch2022r2
OR
siemenssiveillance_videoMatch2022r3
OR
siemenssiveillance_videoMatch2023r1

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2020 R2",
    "versions": [
      {
        "version": "All versions < V20.2 HotfixRev14",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2020 R3",
    "versions": [
      {
        "version": "All versions < V20.3 HotfixRev12",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2021 R1",
    "versions": [
      {
        "version": "All versions < V21.1 HotfixRev12",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2021 R2",
    "versions": [
      {
        "version": "All versions < V21.2 HotfixRev8",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2022 R1",
    "versions": [
      {
        "version": "All versions < V22.1 HotfixRev7",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2022 R2",
    "versions": [
      {
        "version": "All versions < V22.2 HotfixRev5",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2022 R3",
    "versions": [
      {
        "version": "All versions < V22.3 HotfixRev2",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Siveillance Video 2023 R1",
    "versions": [
      {
        "version": "All versions < V23.1 HotfixRev1",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

8.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.6%

Related for CVE-2023-30899