Lucene search

K
vulnrichmentTalosVULNRICHMENT:CVE-2023-43491
HistoryApr 17, 2024 - 12:55 p.m.

CVE-2023-43491

2024-04-1712:55:49
CWE-284
talos
github.com
4
information disclosure
peplink smart reader
web interface
http request
vulnerability

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.3

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

An information disclosure vulnerability exists in the web interface /cgi-bin/debug_dump.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:peplink:smart_reader:v1.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "peplink",
    "product": "smart_reader",
    "versions": [
      {
        "status": "affected",
        "version": "v1.2.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.3

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-43491