Search criteria
2 vulnerabilities
CVE-2023-42419 (GCVE-0-2023-42419)
Vulnerability from cvelistv5 – Published: 2024-03-05 05:23 – Updated: 2024-08-02 19:16
VLAI?
Summary
Maintenance Server, in Cybellum's QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.
An attacker with administrative privileges & access to the air-gapped server could potentially use this key to run commands on the server.
The issue was resolved in version 2.28.
Earlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.
Severity ?
CWE
- cwe-321 Use of Hard-coded Cryptographic Key
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cybellum | Maintenance Server |
Affected:
2.15.5 , ≤ 2.27
(custom)
Unaffected: 1.* Unaffected: 2.0 , ≤ 2.19 (custom) Unaffected: 2.28 , ≤ or above (custom) |
Credits
Delikely
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42419",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-06T20:33:08.554990Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:25:27.420Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:51.043Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cybellum.com/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"qcow"
],
"product": "Maintenance Server",
"vendor": "Cybellum",
"versions": [
{
"lessThanOrEqual": "2.27",
"status": "affected",
"version": "2.15.5",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "1.*"
},
{
"lessThanOrEqual": "2.19",
"status": "unaffected",
"version": "2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "or above",
"status": "unaffected",
"version": "2.28",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Delikely"
}
],
"datePublic": "2024-02-21T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMaintenance Server, in\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCybellum\u0027s\u0026nbsp;\u003c/span\u003eQCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\u003c/span\u003e\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker with administrative privileges \u0026amp; access to the air-gapped server could potentially\u0026nbsp;use this key to run commands on the server.\u003c/span\u003e\u003cbr\u003eThe issue was resolved in version 2.28.\u003cbr\u003eEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\u003c/span\u003e\n\n"
}
],
"value": "Maintenance Server, in\u00a0Cybellum\u0027s\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\n\n\nAn attacker with administrative privileges \u0026 access to the air-gapped server could potentially\u00a0use this key to run commands on the server.\nThe issue was resolved in version 2.28.\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "The vulnerability exploitation is limited by the need for administrative access \u0026 connection to internal air-gapped networks, reducing its potential impact"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "cwe-321 Use of Hard-coded Cryptographic Key",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-05T05:23:26.720Z",
"orgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"shortName": "Cybellum"
},
"references": [
{
"url": "https://cybellum.com/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCybellum\u0027s \u003c/span\u003eQCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -\u0026gt; Upgrade to version 2.28 or above\u003cbr\u003eAll other versions/distributions -\u0026gt; Unaffected"
}
],
"value": "\n\n\n\n\nCybellum\u0027s QCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -\u003e Upgrade to version 2.28 or above\nAll other versions/distributions -\u003e Unaffected"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Improper Management of Cryptographic Keys in the Maintenance Server in QCOW Air-Gapped Distribution (China Edition)",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"assignerShortName": "Cybellum",
"cveId": "CVE-2023-42419",
"datePublished": "2024-03-05T05:23:16.947Z",
"dateReserved": "2023-09-08T04:33:08.334Z",
"dateUpdated": "2024-08-02T19:16:51.043Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-38132 (GCVE-0-2022-38132)
Vulnerability from cvelistv5 – Published: 2022-08-23 23:16 – Updated: 2024-09-16 22:56
VLAI?
Summary
Command injection vulnerability in Linksys MR8300 router while Registration to DDNS Service. By specifying username and password, an attacker connected to the router's web interface can execute arbitrary OS commands. The username and password fields are not sanitized correctly and are used as URL construction arguments, allowing URL redirection to an arbitrary server, downloading an arbitrary script file, and eventually executing the file in the device. This issue affects: Linksys MR8300 Router 1.0.
Severity ?
8.2 (High)
CWE
- CWE-78 - OS Command Injection
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linksys | MR8300 Router |
Affected:
Firmware 1.0
|
Credits
Cybellum Technologies LTD.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T10:45:52.623Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://downloads.linksys.com/support/assets/releasenotes/MR8300_1.1.10.210186_Customer_ReleaseNotes.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "MR8300 Router",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "Firmware 1.0"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "Vulnerable Router connected."
}
],
"credits": [
{
"lang": "en",
"value": "Cybellum Technologies LTD."
}
],
"datePublic": "2022-08-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Command injection vulnerability in Linksys MR8300 router while Registration to DDNS Service. By specifying username and password, an attacker connected to the router\u0027s web interface can execute arbitrary OS commands. The username and password fields are not sanitized correctly and are used as URL construction arguments, allowing URL redirection to an arbitrary server, downloading an arbitrary script file, and eventually executing the file in the device. This issue affects: Linksys MR8300 Router 1.0."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-23T23:16:32",
"orgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"shortName": "Cybellum"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://downloads.linksys.com/support/assets/releasenotes/MR8300_1.1.10.210186_Customer_ReleaseNotes.txt"
}
],
"solutions": [
{
"lang": "en",
"value": "Upgrade to firmware version 1,1 is available here: https://www.linksys.com/support-article?articleNum=293921"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Command injection vulnerability in Linksys MR8300 router while Registration to DDNS Service. By specifying username and password, an attacker connected to the router\u0027s web interface can execute arbitrary OS commands.",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cybellum.com",
"DATE_PUBLIC": "2022-08-23T14:10:00.000Z",
"ID": "CVE-2022-38132",
"STATE": "PUBLIC",
"TITLE": "Command injection vulnerability in Linksys MR8300 router while Registration to DDNS Service. By specifying username and password, an attacker connected to the router\u0027s web interface can execute arbitrary OS commands."
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "MR8300 Router",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "Firmware",
"version_value": "1.0"
}
]
}
}
]
},
"vendor_name": "Linksys"
}
]
}
},
"configuration": [
{
"lang": "en",
"value": "Vulnerable Router connected."
}
],
"credit": [
{
"lang": "eng",
"value": "Cybellum Technologies LTD."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Command injection vulnerability in Linksys MR8300 router while Registration to DDNS Service. By specifying username and password, an attacker connected to the router\u0027s web interface can execute arbitrary OS commands. The username and password fields are not sanitized correctly and are used as URL construction arguments, allowing URL redirection to an arbitrary server, downloading an arbitrary script file, and eventually executing the file in the device. This issue affects: Linksys MR8300 Router 1.0."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://downloads.linksys.com/support/assets/releasenotes/MR8300_1.1.10.210186_Customer_ReleaseNotes.txt",
"refsource": "MISC",
"url": "https://downloads.linksys.com/support/assets/releasenotes/MR8300_1.1.10.210186_Customer_ReleaseNotes.txt"
}
]
},
"solution": [
{
"lang": "en",
"value": "Upgrade to firmware version 1,1 is available here: https://www.linksys.com/support-article?articleNum=293921"
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"assignerShortName": "Cybellum",
"cveId": "CVE-2022-38132",
"datePublished": "2022-08-23T23:16:32.342513Z",
"dateReserved": "2022-08-10T00:00:00",
"dateUpdated": "2024-09-16T22:56:38.631Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}