Lucene search

K
cveA87f365f-9d39-4848-9b3a-58c7cae69cabCVE-2023-33219
HistoryDec 15, 2023 - 12:15 p.m.

CVE-2023-33219

2023-12-1512:15:43
CWE-787
CWE-121
a87f365f-9d39-4848-9b3a-58c7cae69cab
web.nvd.nist.gov
6
cve
2023
33219
retrofit
validation
command
handler
vulnerability
buffer overflow
remote code execution
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.6%

The handler of the retrofit validation command doesn’t properly check the boundaries when performing certain validation
operations. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the
targeted device

Affected configurations

NVD
Node
idemiasigma_lite_firmwareRange<4.15.5
AND
idemiasigma_liteMatch-
Node
idemiasigma_lite\+_firmwareRange<4.15.5
AND
idemiasigma_lite\+Match-
Node
idemiasigma_extreme_firmwareRange<4.15.5
AND
idemiasigma_extremeMatch-
Node
idemiasigma_wide_firmwareRange<4.15.5
AND
idemiasigma_wideMatch-
Node
idemiamorphowave_compact_firmwareRange<2.12.2
AND
idemiamorphowave_compactMatch-
Node
idemiamorphowave_xp_firmwareRange<2.12.2
AND
idemiamorphowave_xpMatch-
Node
idemiavisionpass_firmwareRange<2.12.2
AND
idemiavisionpassMatch-
Node
idemiamorphowave_sp_firmwareRange<1.2.7
AND
idemiamorphowave_spMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Lite & Lite +",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Wide",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Extreme",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "MorphoWave Compact/XP",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "2.12.2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VisionPass",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "2.12.2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "MorphoWave SP",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "1.2.7",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.6%

Related for CVE-2023-33219