Lucene search

K
cvelistSELCVELIST:CVE-2023-34389
HistoryNov 30, 2023 - 4:54 p.m.

CVE-2023-34389 Allocation of resources without limits could lead to denial of service

2023-11-3016:54:29
CWE-770
SEL
www.cve.org
3
denialofservice
remoteattack
authenticatedattack

CVSS3

4.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

28.4%

An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time.

See product Instruction Manual Appendix A dated 20230830 for more details.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SEL-451",
    "vendor": "Schweitzer Engineering Laboratories",
    "versions": [
      {
        "lessThan": "R315-V4",
        "status": "affected",
        "version": "R315-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R316-V4",
        "status": "affected",
        "version": "R316-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R317-V4",
        "status": "affected",
        "version": "R317-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R318-V5",
        "status": "affected",
        "version": "R318-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R320-V3",
        "status": "affected",
        "version": "R320-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R321-V3",
        "status": "affected",
        "version": "R321-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R322-V3",
        "status": "affected",
        "version": "R322-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R323-V5",
        "status": "affected",
        "version": "R323-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R324-V4",
        "status": "affected",
        "version": "R324-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R325-V3",
        "status": "affected",
        "version": "R325-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R326-V1",
        "status": "affected",
        "version": "R326-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R327-V1",
        "status": "affected",
        "version": "R327-V0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

4.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

28.4%

Related for CVELIST:CVE-2023-34389