Lucene search

K
cve[email protected]CVE-2023-41256
HistorySep 11, 2023 - 7:15 p.m.

CVE-2023-41256

2023-09-1119:15:43
CWE-288
web.nvd.nist.gov
20
cve-2023-41256
dover fueling solutions
maglink lx
web console configuration
authentication bypass
unauthorized access

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.1%

Dover Fueling Solutions MAGLINK LX Web Console Configuration versions 2.5.1, 2.5.2, 2.5.3, 2.6.1, 2.11, 3.0, 3.2, and 3.3 are vulnerable to authentication bypass that could allow an unauthorized attacker to obtain user access.

Affected configurations

NVD
Node
doverfuelingsolutionsmaglink_lx_web_console_configurationMatch2.5.1
OR
doverfuelingsolutionsmaglink_lx_web_console_configurationMatch2.5.2
OR
doverfuelingsolutionsmaglink_lx_web_console_configurationMatch2.5.3
OR
doverfuelingsolutionsmaglink_lx_web_console_configurationMatch2.6.1
OR
doverfuelingsolutionsmaglink_lx_web_console_configurationMatch2.11
OR
doverfuelingsolutionsmaglink_lx_web_console_configurationMatch3.0
OR
doverfuelingsolutionsmaglink_lx_web_console_configurationMatch3.2
OR
doverfuelingsolutionsmaglink_lx_web_console_configurationMatch3.3
AND
doverfuelingsolutionsmaglink_lx_3Match-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "MAGLINK LX Web Console Configuration",
    "vendor": "Dover Fueling Solutions",
    "versions": [
      {
        "status": "affected",
        "version": "2.5.1"
      },
      {
        "status": "affected",
        "version": "2.5.2"
      },
      {
        "status": "affected",
        "version": "2.5.3"
      },
      {
        "status": "affected",
        "version": "2.6.1"
      },
      {
        "status": "affected",
        "version": "2.11"
      },
      {
        "status": "affected",
        "version": "3.0"
      },
      {
        "status": "affected",
        "version": "3.2"
      },
      {
        "status": "affected",
        "version": "3.3"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.1%

Related for CVE-2023-41256