Search criteria

3 vulnerabilities

CVE-2025-1077 (GCVE-0-2025-1077)

Vulnerability from cvelistv5 – Published: 2025-02-07 08:32 – Updated: 2025-02-07 15:53
VLAI?
Summary
A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather). The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled. A remote unauthenticated attacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS pipeline with specially crafted Form Properties, enabling remote execution of arbitrary Python code. This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services are run under a privileged user account—contrary to the documented installation best practices. Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).
CWE
  • CWE-502 - Deserialization of Untrusted Data
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
IBL Software Engineering Visual Weather Affected: 8.2.5
Affected: 7.3.9
Affected: 7.3.6 (Enterprise Build)
Affected: 8.5.2 (Enterprise Build)
Create a notification for this product.
    IBL Software Engineering NAMIS Affected: 8.2.5
Affected: 7.3.9
Affected: 7.3.6 (Enterprise Build)
Affected: 8.5.2 (Enterprise Build)
Create a notification for this product.
    IBL Software Engineering Aero Weather Affected: 8.2.5
Affected: 7.3.9
Affected: 7.3.6 (Enterprise Build)
Affected: 8.5.2 (Enterprise Build)
Create a notification for this product.
    IBL Software Engineering Satellite Weather Affected: 8.2.5
Affected: 7.3.9
Affected: 7.3.6 (Enterprise Build)
Affected: 8.5.2 (Enterprise Build)
Create a notification for this product.
Credits
Ianis BERNARD (NCIA)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1077",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-07T15:53:17.352997Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-07T15:53:44.186Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Visual Weather",
          "vendor": "IBL Software Engineering",
          "versions": [
            {
              "status": "affected",
              "version": "8.2.5"
            },
            {
              "status": "affected",
              "version": "7.3.9"
            },
            {
              "status": "affected",
              "version": "7.3.6 (Enterprise Build)"
            },
            {
              "status": "affected",
              "version": "8.5.2 (Enterprise Build)"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "NAMIS",
          "vendor": "IBL Software Engineering",
          "versions": [
            {
              "status": "affected",
              "version": "8.2.5"
            },
            {
              "status": "affected",
              "version": "7.3.9"
            },
            {
              "status": "affected",
              "version": "7.3.6 (Enterprise Build)"
            },
            {
              "status": "affected",
              "version": "8.5.2 (Enterprise Build)"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aero Weather",
          "vendor": "IBL Software Engineering",
          "versions": [
            {
              "status": "affected",
              "version": "8.2.5"
            },
            {
              "status": "affected",
              "version": "7.3.9"
            },
            {
              "status": "affected",
              "version": "7.3.6 (Enterprise Build)"
            },
            {
              "status": "affected",
              "version": "8.5.2 (Enterprise Build)"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Satellite Weather",
          "vendor": "IBL Software Engineering",
          "versions": [
            {
              "status": "affected",
              "version": "8.2.5"
            },
            {
              "status": "affected",
              "version": "7.3.9"
            },
            {
              "status": "affected",
              "version": "7.3.6 (Enterprise Build)"
            },
            {
              "status": "affected",
              "version": "8.5.2 (Enterprise Build)"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vulnerability is triggered in server configurations where the \u003cb\u003ePDS pipeline\u003c/b\u003e utilizes the \u003cb\u003eIPDS pipeline\u003c/b\u003e with \u003cb\u003eMessage Editor Output Filters\u003c/b\u003e enabled\u003cbr\u003e"
            }
          ],
          "value": "The vulnerability is triggered in server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ianis BERNARD (NCIA)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA security vulnerability has been identified in the \u003cb\u003eIBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather)\u003c/b\u003e.\u0026nbsp;The vulnerability is present in the \u003cb\u003eProduct Delivery Service (PDS) component in specific server configurations\u003c/b\u003e where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\u003c/p\u003e\u003cp\u003eA remote\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eunauthenticated\u003c/span\u003e\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u0026nbsp;pipeline\u0026nbsp;with specially crafted Form Properties, enabling \u003cb\u003eremote execution of arbitrary Python code\u003c/b\u003e.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eThis vulnerability could lead to a \u003cb\u003efull system compromise\u003c/b\u003e of the affected server, particularly if Visual Weather services\u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;are run under a privileged user account\u2014contrary to the documented installation best practices.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\u003c/span\u003e\n\n\u003cbr\u003e\u003c/span\u003e\u003c/p\u003e"
            }
          ],
          "value": "A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather).\u00a0The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\n\nA remote\u00a0unauthenticated\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS\u00a0pipeline\u00a0with specially crafted Form Properties, enabling remote execution of arbitrary Python code.\u00a0This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services\u00a0are run under a privileged user account\u2014contrary to the documented installation best practices.\n\n\n\nUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-153",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-153 Input Data Manipulation"
            }
          ]
        },
        {
          "capecId": "CAPEC-242",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-242 Code Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 9.5,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-07T08:43:31.311Z",
        "orgId": "bc375322-d3d7-4481-b261-e29662236cfd",
        "shortName": "SK-CERT"
      },
      "references": [
        {
          "url": "https://www.iblsoft.com/security/advisory-isec-2024-001/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher).\u003cbr\u003e"
            }
          ],
          "value": "Upgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Remote Code Execution vulnerability in IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather)",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn order to mitigate the vulnerability:\u003cbr\u003e-\u0026nbsp;Disable PDS pipelines utilizing IPDS pipelines in server configurations.\u003cbr\u003e-\u0026nbsp;Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\u003cbr\u003e-\u0026nbsp;Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\u003cbr\u003e\u003cbr\u003eIt is also recommended to \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003econtact IBL Support Team for more detailed security and server hardening guidelines.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "In order to mitigate the vulnerability:\n-\u00a0Disable PDS pipelines utilizing IPDS pipelines in server configurations.\n-\u00a0Enforce installation best practices by ensuring Visual Weather services are not run under a privileged user account.\n-\u00a0Restrict network access to the PDS pipeline endpoint to trusted IP ranges only.\n\nIt is also recommended to contact IBL Support Team for more detailed security and server hardening guidelines."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bc375322-d3d7-4481-b261-e29662236cfd",
    "assignerShortName": "SK-CERT",
    "cveId": "CVE-2025-1077",
    "datePublished": "2025-02-07T08:32:01.813Z",
    "dateReserved": "2025-02-06T11:23:05.466Z",
    "dateUpdated": "2025-02-07T15:53:44.186Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-3263 (GCVE-0-2024-3263)

Vulnerability from cvelistv5 – Published: 2024-05-13 09:17 – Updated: 2024-08-01 20:05
VLAI?
Summary
YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions <= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.
CWE
  • CWE-521 - Weak Password Requirements
  • CWE-287 - Improper Authentication
Assigner
Impacted products
Vendor Product Version
YMS VIS Pro Affected: 0 , ≤ 3.3.0.6 (custom)
Create a notification for this product.
Credits
REMEDIATA (support@remediata.com)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:yms:vis_pro:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vis_pro",
            "vendor": "yms",
            "versions": [
              {
                "lessThanOrEqual": "3.3.0.6",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3263",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-13T15:37:29.443030Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-06T17:24:49.410Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:05:08.248Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.svps.sk/vis/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VIS Pro",
          "vendor": "YMS",
          "versions": [
            {
              "lessThanOrEqual": "3.3.0.6",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "REMEDIATA (support@remediata.com)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cp\u003eYMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u0026lt;= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e"
            }
          ],
          "value": "YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u003c= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\n\n\n\n\n\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-112",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-112 Brute Force"
            }
          ]
        },
        {
          "capecId": "CAPEC-49",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-49 Password Brute Forcing"
            }
          ]
        },
        {
          "capecId": "CAPEC-114",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-114 Authentication Abuse"
            }
          ]
        },
        {
          "capecId": "CAPEC-16",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-16 Dictionary-based Password Attack"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-521",
              "description": "CWE-521 Weak Password Requirements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287 Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-13T09:17:12.216Z",
        "orgId": "bc375322-d3d7-4481-b261-e29662236cfd",
        "shortName": "SK-CERT"
      },
      "references": [
        {
          "url": "https://www.svps.sk/vis/"
        },
        {
          "url": "https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2024-02-25T22:53:00.000Z",
          "value": "Vulnerability reported to SK-CERT"
        },
        {
          "lang": "en",
          "time": "2024-02-26T12:12:00.000Z",
          "value": "Developer and system operator notified by SK-CERT"
        },
        {
          "lang": "en",
          "time": "2024-02-27T15:10:00.000Z",
          "value": "Vulnerability confirmed by system operator"
        },
        {
          "lang": "en",
          "time": "2024-04-17T14:18:00.000Z",
          "value": "Developer and system operator confirmed vulnerability fix"
        }
      ],
      "title": "Improper authentication in YMS VIS Pro",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bc375322-d3d7-4481-b261-e29662236cfd",
    "assignerShortName": "SK-CERT",
    "cveId": "CVE-2024-3263",
    "datePublished": "2024-05-13T09:17:12.216Z",
    "dateReserved": "2024-04-03T11:57:41.321Z",
    "dateUpdated": "2024-08-01T20:05:08.248Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-3612 (GCVE-0-2023-3612)

Vulnerability from cvelistv5 – Published: 2023-09-11 09:04 – Updated: 2024-09-26 14:32
VLAI?
Summary
Govee Home app has unprotected access to WebView component which can be opened by any app on the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or steal sensitive user data by displaying phishing content.
CWE
  • CWE-749 - Exposed Dangerous Method or Function
Assigner
Impacted products
Vendor Product Version
Govee Govee Home Affected: 5.7.03 , < 5.8.01 (custom)
Create a notification for this product.
Credits
Jan Adamski (johnny1337.pl; jan.adamski@nask.pl)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:01:57.140Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-3612",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-26T14:32:16.829725Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-26T14:32:25.277Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Android",
            "iOS"
          ],
          "product": "Govee Home",
          "vendor": "Govee",
          "versions": [
            {
              "lessThan": "5.8.01",
              "status": "affected",
              "version": "5.7.03",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jan Adamski (johnny1337.pl; jan.adamski@nask.pl)"
        }
      ],
      "datePublic": "2023-09-11T10:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Govee Home app has unprotected access to WebView component which can be opened by any app on\u0026nbsp;the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or\u0026nbsp;steal sensitive user data by displaying phishing content. "
            }
          ],
          "value": "Govee Home app has unprotected access to WebView component which can be opened by any app on\u00a0the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or\u00a0steal sensitive user data by displaying phishing content. "
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-98",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-98 Phishing"
            }
          ]
        },
        {
          "capecId": "CAPEC-19",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-19 Embedding Scripts within Scripts"
            }
          ]
        },
        {
          "capecId": "CAPEC-22",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-22 Exploiting Trust in Client"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-749",
              "description": "CWE-749 Exposed Dangerous Method or Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-13T06:17:09.814Z",
        "orgId": "bc375322-d3d7-4481-b261-e29662236cfd",
        "shortName": "SK-CERT"
      },
      "references": [
        {
          "url": "https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to version 5.8.01 (released on 17.08.2023) or latest"
            }
          ],
          "value": "Update to version 5.8.01 (released on 17.08.2023) or latest"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2023-07-10T11:00:00.000Z",
          "value": "Received information about vulnerability from a security researcher - Jan Adamski (johnny1337.pl; jan.adamski@nask.pl)"
        },
        {
          "lang": "en",
          "time": "2023-07-11T11:39:00.000Z",
          "value": "Initial notification of the vendor"
        },
        {
          "lang": "en",
          "time": "2023-08-03T13:25:00.000Z",
          "value": "Vendor confirmed the receipt of vulnerability report"
        },
        {
          "lang": "en",
          "time": "2023-08-10T13:25:00.000Z",
          "value": "Vendor informed about security update being released on 17.08.2023"
        },
        {
          "lang": "en",
          "time": "2023-08-17T00:00:00.000Z",
          "value": "Updated version of the application released"
        }
      ],
      "title": "Unprotected WebView access in Govee Home App",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bc375322-d3d7-4481-b261-e29662236cfd",
    "assignerShortName": "SK-CERT",
    "cveId": "CVE-2023-3612",
    "datePublished": "2023-09-11T09:04:09.924Z",
    "dateReserved": "2023-07-11T06:15:11.185Z",
    "dateUpdated": "2024-09-26T14:32:25.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}