Lucene search

K
cve[email protected]CVE-2023-40707
HistoryAug 24, 2023 - 5:15 p.m.

CVE-2023-40707

2023-08-2417:15:08
CWE-521
web.nvd.nist.gov
17
snap pac s1
firmware
r10.3b
brute force attack
complex password
nvd

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.8%

There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don’t set up complex credentials.

Affected configurations

NVD
Node
opto22snap_pac_s1_firmwareMatchr10.3b
AND
opto22snap_pac_s1Match-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SNAP PAC S1",
    "vendor": "OPTO 22",
    "versions": [
      {
        "status": "affected",
        "version": "R10.3b"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.8%

Related for CVE-2023-40707