Lucene search

K
cveA87f365f-9d39-4848-9b3a-58c7cae69cabCVE-2023-33221
HistoryDec 15, 2023 - 12:15 p.m.

CVE-2023-33221

2023-12-1512:15:43
CWE-787
CWE-122
a87f365f-9d39-4848-9b3a-58c7cae69cab
web.nvd.nist.gov
10
cve
desfire
keys
boundary check
buffer overflow
remote code execution
security
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.0%

When reading DesFire keys, the function that reads the card isn’t properly checking the boundaries when copying
internally the data received. This allows a heap based buffer overflow that could lead to a potential Remote Code
Execution on the targeted device. This is especially problematic if you use Default DESFire key.

Affected configurations

NVD
Node
idemiasigma_lite_firmwareRange<4.15.5
AND
idemiasigma_liteMatch-
Node
idemiasigma_lite\+_firmwareRange<4.15.5
AND
idemiasigma_lite\+Match-
Node
idemiasigma_extreme_firmwareRange<4.15.5
AND
idemiasigma_extremeMatch-
Node
idemiasigma_wide_firmwareRange<4.15.5
AND
idemiasigma_wideMatch-
Node
idemiamorphowave_compact_firmwareRange<2.12.2
AND
idemiamorphowave_compactMatch-
Node
idemiamorphowave_xp_firmwareRange<2.12.2
AND
idemiamorphowave_xpMatch-
Node
idemiavisionpass_firmwareRange<2.12.2
AND
idemiavisionpassMatch-
Node
idemiamorphowave_sp_firmwareRange<1.2.7
AND
idemiamorphowave_spMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Lite & Lite +",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Wide",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Extreme",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "4.15.5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "MorphoWave Compact/XP",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "2.12.2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VisionPass",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "2.12.2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "MorphoWave SP",
    "vendor": "IDEMIA",
    "versions": [
      {
        "lessThan": "1.2.7",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.0%

Related for CVE-2023-33221