Search criteria
2 vulnerabilities found for Maintenance Server by Cybellum
CVE-2023-42419 (GCVE-0-2023-42419)
Vulnerability from cvelistv5 – Published: 2024-03-05 05:23 – Updated: 2024-08-02 19:16
VLAI?
Summary
Maintenance Server, in Cybellum's QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.
An attacker with administrative privileges & access to the air-gapped server could potentially use this key to run commands on the server.
The issue was resolved in version 2.28.
Earlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.
Severity ?
CWE
- cwe-321 Use of Hard-coded Cryptographic Key
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cybellum | Maintenance Server |
Affected:
2.15.5 , ≤ 2.27
(custom)
Unaffected: 1.* Unaffected: 2.0 , ≤ 2.19 (custom) Unaffected: 2.28 , ≤ or above (custom) |
Credits
Delikely
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42419",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-06T20:33:08.554990Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:25:27.420Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:51.043Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cybellum.com/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"qcow"
],
"product": "Maintenance Server",
"vendor": "Cybellum",
"versions": [
{
"lessThanOrEqual": "2.27",
"status": "affected",
"version": "2.15.5",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "1.*"
},
{
"lessThanOrEqual": "2.19",
"status": "unaffected",
"version": "2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "or above",
"status": "unaffected",
"version": "2.28",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Delikely"
}
],
"datePublic": "2024-02-21T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMaintenance Server, in\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCybellum\u0027s\u0026nbsp;\u003c/span\u003eQCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\u003c/span\u003e\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker with administrative privileges \u0026amp; access to the air-gapped server could potentially\u0026nbsp;use this key to run commands on the server.\u003c/span\u003e\u003cbr\u003eThe issue was resolved in version 2.28.\u003cbr\u003eEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\u003c/span\u003e\n\n"
}
],
"value": "Maintenance Server, in\u00a0Cybellum\u0027s\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\n\n\nAn attacker with administrative privileges \u0026 access to the air-gapped server could potentially\u00a0use this key to run commands on the server.\nThe issue was resolved in version 2.28.\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "The vulnerability exploitation is limited by the need for administrative access \u0026 connection to internal air-gapped networks, reducing its potential impact"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "cwe-321 Use of Hard-coded Cryptographic Key",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-05T05:23:26.720Z",
"orgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"shortName": "Cybellum"
},
"references": [
{
"url": "https://cybellum.com/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCybellum\u0027s \u003c/span\u003eQCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -\u0026gt; Upgrade to version 2.28 or above\u003cbr\u003eAll other versions/distributions -\u0026gt; Unaffected"
}
],
"value": "\n\n\n\n\nCybellum\u0027s QCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -\u003e Upgrade to version 2.28 or above\nAll other versions/distributions -\u003e Unaffected"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Improper Management of Cryptographic Keys in the Maintenance Server in QCOW Air-Gapped Distribution (China Edition)",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"assignerShortName": "Cybellum",
"cveId": "CVE-2023-42419",
"datePublished": "2024-03-05T05:23:16.947Z",
"dateReserved": "2023-09-08T04:33:08.334Z",
"dateUpdated": "2024-08-02T19:16:51.043Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-42419 (GCVE-0-2023-42419)
Vulnerability from nvd – Published: 2024-03-05 05:23 – Updated: 2024-08-02 19:16
VLAI?
Summary
Maintenance Server, in Cybellum's QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.
An attacker with administrative privileges & access to the air-gapped server could potentially use this key to run commands on the server.
The issue was resolved in version 2.28.
Earlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.
Severity ?
CWE
- cwe-321 Use of Hard-coded Cryptographic Key
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cybellum | Maintenance Server |
Affected:
2.15.5 , ≤ 2.27
(custom)
Unaffected: 1.* Unaffected: 2.0 , ≤ 2.19 (custom) Unaffected: 2.28 , ≤ or above (custom) |
Credits
Delikely
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42419",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-06T20:33:08.554990Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:25:27.420Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:51.043Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cybellum.com/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"qcow"
],
"product": "Maintenance Server",
"vendor": "Cybellum",
"versions": [
{
"lessThanOrEqual": "2.27",
"status": "affected",
"version": "2.15.5",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "1.*"
},
{
"lessThanOrEqual": "2.19",
"status": "unaffected",
"version": "2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "or above",
"status": "unaffected",
"version": "2.28",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Delikely"
}
],
"datePublic": "2024-02-21T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMaintenance Server, in\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCybellum\u0027s\u0026nbsp;\u003c/span\u003eQCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\u003c/span\u003e\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker with administrative privileges \u0026amp; access to the air-gapped server could potentially\u0026nbsp;use this key to run commands on the server.\u003c/span\u003e\u003cbr\u003eThe issue was resolved in version 2.28.\u003cbr\u003eEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\u003c/span\u003e\n\n"
}
],
"value": "Maintenance Server, in\u00a0Cybellum\u0027s\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\n\n\nAn attacker with administrative privileges \u0026 access to the air-gapped server could potentially\u00a0use this key to run commands on the server.\nThe issue was resolved in version 2.28.\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "The vulnerability exploitation is limited by the need for administrative access \u0026 connection to internal air-gapped networks, reducing its potential impact"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "cwe-321 Use of Hard-coded Cryptographic Key",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-05T05:23:26.720Z",
"orgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"shortName": "Cybellum"
},
"references": [
{
"url": "https://cybellum.com/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCybellum\u0027s \u003c/span\u003eQCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -\u0026gt; Upgrade to version 2.28 or above\u003cbr\u003eAll other versions/distributions -\u0026gt; Unaffected"
}
],
"value": "\n\n\n\n\nCybellum\u0027s QCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -\u003e Upgrade to version 2.28 or above\nAll other versions/distributions -\u003e Unaffected"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Improper Management of Cryptographic Keys in the Maintenance Server in QCOW Air-Gapped Distribution (China Edition)",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"assignerShortName": "Cybellum",
"cveId": "CVE-2023-42419",
"datePublished": "2024-03-05T05:23:16.947Z",
"dateReserved": "2023-09-08T04:33:08.334Z",
"dateUpdated": "2024-08-02T19:16:51.043Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}