Lucene search

K
vulnrichmentTalosVULNRICHMENT:CVE-2023-45744
HistoryApr 17, 2024 - 12:55 p.m.

CVE-2023-45744

2024-04-1712:55:48
CWE-284
talos
github.com
3
data integrity
peplink smart reader
configuration modification
http request
unauthenticated
vulnerability

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

AI Score

8.2

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

A data integrity vulnerability exists in the web interface /cgi-bin/upload_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:peplink:smart_reader:v1.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "peplink",
    "product": "smart_reader",
    "versions": [
      {
        "status": "affected",
        "version": "v1.2.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H

AI Score

8.2

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-45744