Lucene search

K
cveA87f365f-9d39-4848-9b3a-58c7cae69cabCVE-2023-4667
HistoryNov 28, 2023 - 9:15 a.m.

CVE-2023-4667

2023-11-2809:15:07
CWE-79
a87f365f-9d39-4848-9b3a-58c7cae69cab
web.nvd.nist.gov
13
pac device
web interface
firmware vulnerability
input validation
data leakage
cve-2023-4667

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N

5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.1%

The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.

The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware.

This could lead toΒ Β unauthorized access and data leakage

Affected configurations

NVD
Node
idemiasgima_lite_\&_lite\+Match-
AND
idemiasgima_lite_\&_lite\+_firmware
Node
idemiasigma_wideMatch-
AND
idemiasigma_wide_firmware
Node
idemiasigma_extreme_firmware
AND
idemiasigma_extremeMatch-
Node
idemiamorphowave_compact_firmware
AND
idemiamorphowave_compactMatch-
Node
idemiamorphowave_sp_firmware
AND
idemiamorphowave_spMatch-
Node
idemiavisionpass_firmware
AND
idemiavisionpassMatch-
Node
idemiamorphowave_sp_firmware
AND
idemiamorphowave_spMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Lite & Lite +",
    "vendor": "IDEMIA",
    "versions": [
      {
        "status": "affected",
        "version": "0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Wide",
    "vendor": "IDEMIA",
    "versions": [
      {
        "status": "affected",
        "version": "0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "SIGMA Extreme",
    "vendor": "IDEMIA",
    "versions": [
      {
        "status": "affected",
        "version": "0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "MorphoWave Compact/XP",
    "vendor": "IDEMIA",
    "versions": [
      {
        "status": "affected",
        "version": "0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VisionPass",
    "vendor": "IDEMIA",
    "versions": [
      {
        "status": "affected",
        "version": "0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "MorphoWave SP",
    "vendor": "IDEMIA",
    "versions": [
      {
        "status": "affected",
        "version": "0"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N

5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.1%

Related for CVE-2023-4667