Lucene search

K
nvdA87f365f-9d39-4848-9b3a-58c7cae69cabNVD:CVE-2023-4667
HistoryNov 28, 2023 - 9:15 a.m.

CVE-2023-4667

2023-11-2809:15:07
CWE-79
a87f365f-9d39-4848-9b3a-58c7cae69cab
web.nvd.nist.gov
vulnerability
web interface
malicious scripts
input validation
output encoding
unauthorized access
data leakage
firmware

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

14.1%

The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.

The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware.

This could lead toΒ Β unauthorized access and data leakage

Affected configurations

NVD
Node
idemiasgima_lite_\&_lite\+Match-
AND
idemiasgima_lite_\&_lite\+_firmware
Node
idemiasigma_wideMatch-
AND
idemiasigma_wide_firmware
Node
idemiasigma_extreme_firmware
AND
idemiasigma_extremeMatch-
Node
idemiamorphowave_compact_firmware
AND
idemiamorphowave_compactMatch-
Node
idemiamorphowave_sp_firmware
AND
idemiamorphowave_spMatch-
Node
idemiavisionpass_firmware
AND
idemiavisionpassMatch-
Node
idemiamorphowave_sp_firmware
AND
idemiamorphowave_spMatch-

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

14.1%

Related for NVD:CVE-2023-4667