Lucene search

K
cveFc9afe74-3f80-4fb7-a313-e6f036a89882CVE-2023-5747
HistoryNov 13, 2023 - 8:15 a.m.

CVE-2023-5747

2023-11-1308:15:26
CWE-345
CWE-347
fc9afe74-3f80-4fb7-a313-e6f036a89882
web.nvd.nist.gov
24
cve-2023-5747
wave server
remote code execution
camera device
command injection
patched firmware
hanwhavision
security report

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.2%

Bashis, a Security Researcher at IPVM has found a flaw that allows for a remote code execution during the installation of Wave on the camera device. The Wave server application in camera device was vulnerable to command injection allowing an attacker to run arbitrary code. HanwhaVision has released patched firmware for the highlighted flaw. Please refer to the hanwhavision security report for more information and solution."

Affected configurations

NVD
Node
hanwhavisionwave_server_softwareRange<5.1.1.37647
OR
hanwhavisionpno-a6081r-e1t_firmwareMatch2.21.02
AND
hanwhavisionpno-a6081r-e1tMatch-
Node
hanwhavisionwave_server_softwareRange<5.1.1.37647
OR
hanwhavisionpno-a6081r-e2t_firmwareMatch2.21.02
AND
hanwhavisionpno-a6081r-e2tMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "PNV-A6081R",
    "vendor": "Hanwha Vision Co., Ltd.",
    "versions": [
      {
        "status": "affected",
        "version": "2.21.02"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.2%

Related for CVE-2023-5747