Lucene search

K
cve[email protected]CVE-2023-43775
HistorySep 27, 2023 - 3:19 p.m.

CVE-2023-43775

2023-09-2715:19:34
CWE-400
web.nvd.nist.gov
11
cve-2023-43775
denial-of-service
eaton smp gateway
web server
vulnerability
attack
automation platform
availability
product
safe mode
nvd

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.2 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows

attacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause
the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is
not vulnerable anymore.

Affected configurations

NVD
Node
eatonsmp_sg-4260Match-
AND
eatonsmp_sg-4260_firmwareRange8.08.0r9
OR
eatonsmp_sg-4260_firmwareRange8.18.1r5
OR
eatonsmp_sg-4260_firmwareRange8.28.2r4
Node
eatonsmp_sg-4250Match-
AND
eatonsmp_sg-4250_firmwareRange8.08.0r9
OR
eatonsmp_sg-4250_firmwareRange8.18.1r5
OR
eatonsmp_sg-4250_firmwareRange8.28.2r4
OR
eatonsmp_sg-4250_firmwareMatch7.0
OR
eatonsmp_sg-4250_firmwareMatch7.1
OR
eatonsmp_sg-4250_firmwareMatch7.2
Node
eatonsmp_4\/dpMatch-
AND
eatonsmp_4\/dp_firmwareRange8.08.0r9
OR
eatonsmp_4\/dp_firmwareRange8.18.1r5
OR
eatonsmp_4\/dp_firmwareRange8.28.2r4
OR
eatonsmp_4\/dp_firmwareMatch6.3
OR
eatonsmp_4\/dp_firmwareMatch7.0
OR
eatonsmp_4\/dp_firmwareMatch7.1
OR
eatonsmp_4\/dp_firmwareMatch7.2
Node
eatonsmp_16Match-
AND
eatonsmp_16_firmwareRange8.08.0r9
OR
eatonsmp_16_firmwareMatch6.3
OR
eatonsmp_16_firmwareMatch7.0
OR
eatonsmp_16_firmwareMatch7.1
OR
eatonsmp_16_firmwareMatch7.2

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SMP SG-4260",
    "vendor": "Eaton",
    "versions": [
      {
        "lessThan": "8.0R9",
        "status": "affected",
        "version": "8.0",
        "versionType": "custom"
      },
      {
        "lessThan": "8.1R5",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "lessThan": "8.2R4",
        "status": "affected",
        "version": "8.2",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SMP SG-4250",
    "vendor": "Eaton",
    "versions": [
      {
        "status": "affected",
        "version": "7.0"
      },
      {
        "status": "affected",
        "version": "7.1"
      },
      {
        "status": "affected",
        "version": "7.2"
      },
      {
        "lessThan": "8.0R9",
        "status": "affected",
        "version": "8.0",
        "versionType": "custom"
      },
      {
        "lessThan": "8.1R5",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "lessThan": "8.2R4",
        "status": "affected",
        "version": "8.2",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SMP 4/DP",
    "vendor": "Eaton",
    "versions": [
      {
        "status": "affected",
        "version": "6.3"
      },
      {
        "status": "affected",
        "version": "7.0"
      },
      {
        "status": "affected",
        "version": "7.1"
      },
      {
        "status": "affected",
        "version": "7.2"
      },
      {
        "lessThan": "8.0R9",
        "status": "affected",
        "version": "8.0",
        "versionType": "custom"
      },
      {
        "lessThan": "8.1R5",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "lessThan": "8.2R4",
        "status": "affected",
        "version": "8.2",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SMP 16",
    "vendor": "Eaton",
    "versions": [
      {
        "status": "affected",
        "version": "6.3"
      },
      {
        "status": "affected",
        "version": "7.0"
      },
      {
        "status": "affected",
        "version": "7.1"
      },
      {
        "status": "affected",
        "version": "7.2"
      },
      {
        "lessThan": "8.0R9",
        "status": "affected",
        "version": "8.0",
        "versionType": "custom"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.2 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2023-43775