Lucene search

K
nvd[email protected]NVD:CVE-2023-35802
HistoryJul 15, 2023 - 2:15 a.m.

CVE-2023-35802

2023-07-1502:15:08
CWE-120
web.nvd.nist.gov
1
iq engine
buffer overflow
capwap protocol
cve-2023-35802
remote code execution
elevated privileges
access control

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

78.3%

IQ Engine before 10.6r1 on Extreme Network AP devices has a Buffer Overflow in the implementation of the CAPWAP protocol that may be exploited to obtain elevated privileges to conduct remote code execution. Access to the internal management interface/subnet is required to conduct the exploit.

Affected configurations

Nvd
Node
extremenetworksiq_engineRange<10.6r1
AND
extremenetworksap122Match-
OR
extremenetworksap130Match-
OR
extremenetworksap150wMatch-
OR
extremenetworksap250Match-
OR
extremenetworksap30Match-
OR
extremenetworksap3000Match-
OR
extremenetworksap3000xMatch-
OR
extremenetworksap302wMatch-
OR
extremenetworksap305cMatch-
OR
extremenetworksap305c-1Match-
OR
extremenetworksap305cxMatch-
OR
extremenetworksap4000Match-
OR
extremenetworksap4000-1Match-
OR
extremenetworksap410cMatch-
OR
extremenetworksap410c-1Match-
OR
extremenetworksap460cMatch-
OR
extremenetworksap460s12cMatch-
OR
extremenetworksap460s6cMatch-
OR
extremenetworksap5010Match-
OR
extremenetworksap5050dMatch-
OR
extremenetworksap5050uMatch-
OR
extremenetworksap510cMatch-
OR
extremenetworksap510cxMatch-
OR
extremenetworksap630Match-
OR
extremenetworksap650Match-
OR
extremenetworksap650xMatch-
Node
extremenetworksiq_engineRange<10.6r5
AND
extremenetworksap1130Match-
OR
extremenetworksap550Match-
VendorProductVersionCPE
extremenetworksiq_engine*cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:*
extremenetworksap122-cpe:2.3:h:extremenetworks:ap122:-:*:*:*:*:*:*:*
extremenetworksap130-cpe:2.3:h:extremenetworks:ap130:-:*:*:*:*:*:*:*
extremenetworksap150w-cpe:2.3:h:extremenetworks:ap150w:-:*:*:*:*:*:*:*
extremenetworksap250-cpe:2.3:h:extremenetworks:ap250:-:*:*:*:*:*:*:*
extremenetworksap30-cpe:2.3:h:extremenetworks:ap30:-:*:*:*:*:*:*:*
extremenetworksap3000-cpe:2.3:h:extremenetworks:ap3000:-:*:*:*:*:*:*:*
extremenetworksap3000x-cpe:2.3:h:extremenetworks:ap3000x:-:*:*:*:*:*:*:*
extremenetworksap302w-cpe:2.3:h:extremenetworks:ap302w:-:*:*:*:*:*:*:*
extremenetworksap305c-cpe:2.3:h:extremenetworks:ap305c:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 291

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

78.3%

Related for NVD:CVE-2023-35802