Lucene search

K
nvd[email protected]NVD:CVE-2023-45312
HistoryOct 10, 2023 - 9:15 p.m.

CVE-2023-45312

2023-10-1021:15:09
CWE-1188
web.nvd.nist.gov
2
cve-2023-45312
mtproto_proxy
erlang
remote attacker
remote command execution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

38.0%

In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability.

Affected configurations

Nvd
Node
mtprotomt_proto_proxyRange0.7.2erlang
VendorProductVersionCPE
mtprotomt_proto_proxy*cpe:2.3:a:mtproto:mt_proto_proxy:*:*:*:*:*:erlang:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

38.0%

Related for NVD:CVE-2023-45312