Lucene search

K
cveA87f365f-9d39-4848-9b3a-58c7cae69cabCVE-2023-33220
HistoryDec 15, 2023 - 12:15 p.m.

CVE-2023-33220

2023-12-1512:15:43
CWE-121
CWE-787
a87f365f-9d39-4848-9b3a-58c7cae69cab
web.nvd.nist.gov
8
cve-2023-33220
retrofit validation
firmware
buffer overflow
remote code execution

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.6%

During the retrofit validation process, the firmware doesn’t properly check the boundaries while copying some attributes
to check. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted
device

Affected configurations

NVD
Node
idemiasigma_lite_firmwareRange<4.15.5
AND
idemiasigma_liteMatch-
Node
idemiasigma_lite\+_firmwareRange<4.15.5
AND
idemiasigma_lite\+Match-
Node
idemiasigma_extreme_firmwareRange<4.15.5
AND
idemiasigma_extremeMatch-
Node
idemiasigma_wide_firmwareRange<4.15.5
AND
idemiasigma_wideMatch-
Node
idemiamorphowave_compact_firmwareRange<2.12.2
AND
idemiamorphowave_compactMatch-
Node
idemiamorphowave_xp_firmwareRange<2.12.2
AND
idemiamorphowave_xpMatch-
Node
idemiavisionpass_firmwareRange<2.12.2
AND
idemiavisionpassMatch-
Node
idemiamorphowave_sp_firmwareRange<1.2.7
AND
idemiamorphowave_spMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Lite & Lite +",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Wide",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Extreme",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "MorphoWave Compact/XP",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "2.12.2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VisionPass",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "2.12.2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "MorphoWave SP",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "1.2.7",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.6%

Related for CVE-2023-33220