Lucene search

K
cve[email protected]CVE-2023-43492
HistoryOct 19, 2023 - 8:15 p.m.

CVE-2023-43492

2023-10-1920:15:09
CWE-121
CWE-787
web.nvd.nist.gov
24
weintek
cmt3000
hmi
web cgi
cve-2023-43492
buffer overflow
codesys.cgi
authentication bypass

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.3%

In Weintek’s cMT3000 HMI Web CGI device, the cgi-bin codesys.cgi contains a stack-based buffer overflow, which could allow an anonymous attacker to hijack control flow and bypass login authentication.

Affected configurations

NVD
Node
weintekcmt-fhdMatch-
AND
weintekcmt-fhd_firmwareRange<20210212
Node
weintekcmt-hdmMatch-
AND
weintekcmt-hdm_firmwareRange<20210206
Node
weintekcmt3071Match-
AND
weintekcmt3071_firmwareRange<20210220
Node
weintekcmt3072Match-
AND
weintekcmt3072_firmwareRange<20210220
Node
weintekcmt3090Match-
AND
weintekcmt3090_firmwareRange<20210220
Node
weintekcmt3103Match-
AND
weintekcmt3103_firmwareRange<20210220
Node
weintekcmt3151Match-
AND
weintekcmt3151_firmwareRange<20210220

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "cMT-FHD",
    "vendor": "Weintek",
    "versions": [
      {
        "lessThanOrEqual": "20210210 ",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "cMT-HDM",
    "vendor": "Weintek",
    "versions": [
      {
        "lessThanOrEqual": "20210204 ",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "cMT3071",
    "vendor": "Weintek",
    "versions": [
      {
        "lessThanOrEqual": "20210218",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "cMT3072",
    "vendor": "Weintek",
    "versions": [
      {
        "lessThanOrEqual": "20210218",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "cMT3103",
    "vendor": "Weintek",
    "versions": [
      {
        "lessThanOrEqual": "20210218",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "cMT3090",
    "vendor": "Weintek",
    "versions": [
      {
        "lessThanOrEqual": "20210218",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "cMT3151",
    "vendor": "Weintek",
    "versions": [
      {
        "lessThanOrEqual": "20210218",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.3%

Related for CVE-2023-43492