Lucene search

K
cve[email protected]CVE-2023-39548
HistoryNov 17, 2023 - 6:15 a.m.

CVE-2023-39548

2023-11-1706:15:34
CWE-434
web.nvd.nist.gov
8
cve-2023-39548
clusterpro x
expresscluster x
arbitrary command execution
cybersecurity
vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.4%

CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.

Affected configurations

NVD
Node
necexpresscluster_xMatch1.0linux
OR
necexpresscluster_xMatch1.0windows
OR
necexpresscluster_xMatch2.0linux
OR
necexpresscluster_xMatch2.0windows
OR
necexpresscluster_xMatch2.1linux
OR
necexpresscluster_xMatch2.1windows
OR
necexpresscluster_xMatch3.0linux
OR
necexpresscluster_xMatch3.0windows
OR
necexpresscluster_xMatch3.1linux
OR
necexpresscluster_xMatch3.1windows
OR
necexpresscluster_xMatch3.2linux
OR
necexpresscluster_xMatch3.2windows
OR
necexpresscluster_xMatch3.3linux
OR
necexpresscluster_xMatch3.3windows
OR
necexpresscluster_xMatch4.0linux
OR
necexpresscluster_xMatch4.0windows
OR
necexpresscluster_xMatch4.1linux
OR
necexpresscluster_xMatch4.1windows
OR
necexpresscluster_xMatch4.2linux
OR
necexpresscluster_xMatch4.2windows
OR
necexpresscluster_xMatch4.3linux
OR
necexpresscluster_xMatch4.3windows
OR
necexpresscluster_xMatch5.0linux
OR
necexpresscluster_xMatch5.0windows
OR
necexpresscluster_xMatch5.1linux
OR
necexpresscluster_xMatch5.1windows
OR
necexpresscluster_x_singleserversafeMatch1.0linux
OR
necexpresscluster_x_singleserversafeMatch1.0windows
OR
necexpresscluster_x_singleserversafeMatch2.0linux
OR
necexpresscluster_x_singleserversafeMatch2.0windows
OR
necexpresscluster_x_singleserversafeMatch2.1linux
OR
necexpresscluster_x_singleserversafeMatch2.1windows
OR
necexpresscluster_x_singleserversafeMatch3.0linux
OR
necexpresscluster_x_singleserversafeMatch3.0windows
OR
necexpresscluster_x_singleserversafeMatch3.1linux
OR
necexpresscluster_x_singleserversafeMatch3.1windows
OR
necexpresscluster_x_singleserversafeMatch3.2linux
OR
necexpresscluster_x_singleserversafeMatch3.2windows
OR
necexpresscluster_x_singleserversafeMatch3.3linux
OR
necexpresscluster_x_singleserversafeMatch3.3windows
OR
necexpresscluster_x_singleserversafeMatch4.0linux
OR
necexpresscluster_x_singleserversafeMatch4.0windows
OR
necexpresscluster_x_singleserversafeMatch4.1linux
OR
necexpresscluster_x_singleserversafeMatch4.1windows
OR
necexpresscluster_x_singleserversafeMatch4.2linux
OR
necexpresscluster_x_singleserversafeMatch4.2windows
OR
necexpresscluster_x_singleserversafeMatch4.3linux
OR
necexpresscluster_x_singleserversafeMatch4.3windows
OR
necexpresscluster_x_singleserversafeMatch5.0linux
OR
necexpresscluster_x_singleserversafeMatch5.0windows
OR
necexpresscluster_x_singleserversafeMatch5.1linux
OR
necexpresscluster_x_singleserversafeMatch5.1windows

CNA Affected

[
  {
    "product": "CLUSTERPRO X (EXPRESSCLUSTER X)",
    "vendor": "NEC Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "1.0, 2.0 2.1, 3.0, 3.1, 3.2, 4.0, 4.1, 4.2, 5.0 and 5.1"
      }
    ]
  },
  {
    "product": "CLUSTERPRO X SingleServerSafe (EXPRESSCLUSTER X SingleServerSafe)",
    "vendor": "NEC Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "1.0, 2.0 2.1, 3.0, 3.1, 3.2, 4.0, 4.1, 4.2, 5.0 and 5.0"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.4%

Related for CVE-2023-39548