All the vulnerabilites related to Rockwell Automation - PowerMonitor 1000
var-201812-0551
Vulnerability from variot
Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arbitrary code into a targeted userâs web browser to gain access to the affected device. Rockwell Automation Allen-Bradley PowerMonitor 1000 Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. A cross-site scripting vulnerability exists in the /Security/Security.shtm page in RockwellAutomationAllen-BradleyPowerMonitor1000
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0551", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "powermonitor 1000", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": "1408-em3a-ent_b" }, { "model": "powermonitor 1000", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "automation allen-bradley powermonitor", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "1000" }, { "model": "automation allen-bradley powermonitor 1408-em3a-ent b", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "1000" }, { "model": "kace k1000 systems management appliance", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "8.0.318" }, { "model": "kace k1000 systems management appliance", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "7.0.121306" }, { "model": "kace k1000 systems management appliance", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "6.4.12075" }, { "model": "kace k1000 systems management appliance", "scope": "ne", "trust": 0.3, "vendor": "dell", "version": "9.0.270" }, { "model": "1408-em3a-ent b", "scope": null, "trust": 0.2, "vendor": "powermonitor 1000", "version": null } ], "sources": [ { "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03462" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "db": "NVD", "id": "CVE-2018-19615" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:powermonitor_1000_firmware:1408-em3a-ent_b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:powermonitor_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-19615" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kapil Khot,Luca.Chiou", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-1158" } ], "trust": 0.6 }, "cve": "CVE-2018-19615", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-19615", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-03462", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "7d860591-463f-11e9-a073-000c29342cb1", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-130292", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2018-19615", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-19615", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-03462", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201812-1158", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-130292", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03462" }, { "db": "VULHUB", "id": "VHN-130292" }, { "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "db": "NVD", "id": "CVE-2018-19615" }, { "db": "CNNVD", "id": "CNNVD-201812-1158" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arbitrary code into a targeted user\u00e2\u0080\u0099s web browser to gain access to the affected device. Rockwell Automation Allen-Bradley PowerMonitor 1000 Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. A cross-site scripting vulnerability exists in the /Security/Security.shtm page in RockwellAutomationAllen-BradleyPowerMonitor1000", "sources": [ { "db": "NVD", "id": "CVE-2018-19615" }, { "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "db": "CNVD", "id": "CNVD-2019-03462" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-130292" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-19615", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-19-050-04", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "150600", "trust": 2.5 }, { "db": "BID", "id": "108538", "trust": 2.0 }, { "db": "BID", "id": "106333", "trust": 2.0 }, { "db": "EXPLOIT-DB", "id": "45928", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201812-1158", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-03462", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-014340", "trust": 0.8 }, { "db": "IVD", "id": "7D860591-463F-11E9-A073-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-130292", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03462" }, { "db": "VULHUB", "id": "VHN-130292" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "db": "NVD", "id": "CVE-2018-19615" }, { "db": "CNNVD", "id": "CNNVD-201812-1158" } ] }, "id": "VAR-201812-0551", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03462" }, { "db": "VULHUB", "id": "VHN-130292" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03462" } ] }, "last_update_date": "2023-12-18T12:56:42.722000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PowerMonitor 1000", "trust": 0.8, "url": "https://ab.rockwellautomation.com/energy-monitoring/1408-powermonitor-1000" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-014340" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-130292" }, { "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "db": "NVD", "id": "CVE-2018-19615" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://packetstormsecurity.com/files/150600/rockwell-automation-allen-bradley-powermonitor-1000-xss.html" }, { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-050-04" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/106333" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/108538" }, { "trust": 1.7, "url": "https://www.exploit-db.com/exploits/45928/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19615" }, { "trust": 1.2, "url": "https://www.rockwellautomation.com/en_in/overview.page" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19615" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-03462" }, { "db": "VULHUB", "id": "VHN-130292" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "db": "NVD", "id": "CVE-2018-19615" }, { "db": "CNNVD", "id": "CNNVD-201812-1158" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03462" }, { "db": "VULHUB", "id": "VHN-130292" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "db": "NVD", "id": "CVE-2018-19615" }, { "db": "CNNVD", "id": "CNNVD-201812-1158" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-31T00:00:00", "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "date": "2019-01-31T00:00:00", "db": "CNVD", "id": "CNVD-2019-03462" }, { "date": "2018-12-26T00:00:00", "db": "VULHUB", "id": "VHN-130292" }, { "date": "2018-11-27T00:00:00", "db": "BID", "id": "106333" }, { "date": "2019-06-01T00:00:00", "db": "BID", "id": "108538" }, { "date": "2019-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "date": "2018-12-26T21:29:02.120000", "db": "NVD", "id": "CVE-2018-19615" }, { "date": "2018-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-1158" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-31T00:00:00", "db": "CNVD", "id": "CNVD-2019-03462" }, { "date": "2023-03-01T00:00:00", "db": "VULHUB", "id": "VHN-130292" }, { "date": "2019-02-22T13:00:00", "db": "BID", "id": "106333" }, { "date": "2019-06-01T00:00:00", "db": "BID", "id": "108538" }, { "date": "2019-08-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014340" }, { "date": "2023-11-07T02:55:35.230000", "db": "NVD", "id": "CVE-2018-19615" }, { "date": "2020-06-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-1158" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Allen-Bradley PowerMonitor 1000 Cross-Site Scripting Vulnerability", "sources": [ { "db": "IVD", "id": "7d860591-463f-11e9-a073-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-03462" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" } ], "trust": 0.6 } }
var-201812-0552
Vulnerability from variot
An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated user can add/edit/remove administrators because access control is implemented on the client side via a disabled attribute for a BUTTON element. Rockwell Automation Allen-Bradley PowerMonitor 1000 Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An access control error vulnerability exists in the Web page of Rockwell Automation Allen-Bradley PowerMonitor 1000, which could allow an attacker to add new users with administrator privileges. An attacker may leverage these issues to bypass certain security restrictions, obtain sensitive information and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. An attacker could exploit this vulnerability to add/edit/remove administrator accounts
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201812-0552", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "powermonitor 1000", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": "1408-em3a-ent_b" }, { "model": "powermonitor 1000", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "automation allen-bradley powermonitor", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "1000" }, { "model": "automation allen-bradley powermonitor 1408-em3a-ent b", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "1000" }, { "model": "kace k1000 systems management appliance", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "8.0.318" }, { "model": "kace k1000 systems management appliance", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "7.0.121306" }, { "model": "kace k1000 systems management appliance", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "6.4.12075" }, { "model": "kace k1000 systems management appliance", "scope": "ne", "trust": 0.3, "vendor": "dell", "version": "9.0.270" }, { "model": "1408-em3a-ent b", "scope": null, "trust": 0.2, "vendor": "powermonitor 1000", "version": null } ], "sources": [ { "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-26886" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "db": "NVD", "id": "CVE-2018-19616" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:powermonitor_1000_firmware:1408-em3a-ent_b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:powermonitor_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-19616" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kapil Khot,Luca.Chiou", "sources": [ { "db": "CNNVD", "id": "CNNVD-201812-203" } ], "trust": 0.6 }, "cve": "CVE-2018-19616", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-19616", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-26886", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7d82f851-463f-11e9-b027-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-130293", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-19616", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-19616", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-26886", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201812-203", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-130293", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-26886" }, { "db": "VULHUB", "id": "VHN-130293" }, { "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "db": "NVD", "id": "CVE-2018-19616" }, { "db": "CNNVD", "id": "CNNVD-201812-203" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated user can add/edit/remove administrators because access control is implemented on the client side via a disabled attribute for a BUTTON element. Rockwell Automation Allen-Bradley PowerMonitor 1000 Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An access control error vulnerability exists in the Web page of Rockwell Automation Allen-Bradley PowerMonitor 1000, which could allow an attacker to add new users with administrator privileges. \nAn attacker may leverage these issues to bypass certain security restrictions, obtain sensitive information and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. An attacker could exploit this vulnerability to add/edit/remove administrator accounts", "sources": [ { "db": "NVD", "id": "CVE-2018-19616" }, { "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "db": "CNVD", "id": "CNVD-2018-26886" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-130293" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-19616", "trust": 3.9 }, { "db": "PACKETSTORM", "id": "150619", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-19-050-04", "trust": 3.1 }, { "db": "BID", "id": "108538", "trust": 2.0 }, { "db": "BID", "id": "106333", "trust": 2.0 }, { "db": "EXPLOIT-DB", "id": "45937", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201812-203", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2018-26886", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-014341", "trust": 0.8 }, { "db": "IVD", "id": "7D82F851-463F-11E9-B027-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-130293", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-26886" }, { "db": "VULHUB", "id": "VHN-130293" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "db": "NVD", "id": "CVE-2018-19616" }, { "db": "CNNVD", "id": "CNNVD-201812-203" } ] }, "id": "VAR-201812-0552", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-26886" }, { "db": "VULHUB", "id": "VHN-130293" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-26886" } ] }, "last_update_date": "2023-12-18T12:56:42.670000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PowerMonitor 1000", "trust": 0.8, "url": "https://ab.rockwellautomation.com/energy-monitoring/1408-powermonitor-1000" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-014341" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "CWE-284", "trust": 0.9 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-130293" }, { "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "db": "NVD", "id": "CVE-2018-19616" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.7, "url": "http://packetstormsecurity.com/files/150619/rockwell-automation-allen-bradley-powermonitor-1000-authentication-bypass.html" }, { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-050-04" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/106333" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/108538" }, { "trust": 1.7, "url": "https://www.exploit-db.com/exploits/45937/" }, { "trust": 1.2, "url": "https://www.rockwellautomation.com/en_in/overview.page" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19616" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19616" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-26886" }, { "db": "VULHUB", "id": "VHN-130293" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "db": "NVD", "id": "CVE-2018-19616" }, { "db": "CNNVD", "id": "CNNVD-201812-203" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-26886" }, { "db": "VULHUB", "id": "VHN-130293" }, { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" }, { "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "db": "NVD", "id": "CVE-2018-19616" }, { "db": "CNNVD", "id": "CNNVD-201812-203" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-28T00:00:00", "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "date": "2018-12-28T00:00:00", "db": "CNVD", "id": "CNVD-2018-26886" }, { "date": "2018-12-26T00:00:00", "db": "VULHUB", "id": "VHN-130293" }, { "date": "2018-11-27T00:00:00", "db": "BID", "id": "106333" }, { "date": "2019-06-01T00:00:00", "db": "BID", "id": "108538" }, { "date": "2019-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "date": "2018-12-26T21:29:02.230000", "db": "NVD", "id": "CVE-2018-19616" }, { "date": "2018-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-203" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-28T00:00:00", "db": "CNVD", "id": "CNVD-2018-26886" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-130293" }, { "date": "2019-02-22T13:00:00", "db": "BID", "id": "106333" }, { "date": "2019-06-01T00:00:00", "db": "BID", "id": "108538" }, { "date": "2019-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014341" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2018-19616" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-203" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rockwell Automation Allen-Bradley PowerMonitor 1000 Access Control Error Vulnerability", "sources": [ { "db": "IVD", "id": "7d82f851-463f-11e9-b027-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-26886" }, { "db": "CNNVD", "id": "CNNVD-201812-203" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "106333" }, { "db": "BID", "id": "108538" } ], "trust": 0.6 } }
cve-2023-2072
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Rockwell Automation | PowerMonitor 1000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:12:19.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:rockwellautomation:powermonitor_1000:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "powermonitor_1000", "vendor": "rockwellautomation", "versions": [ { "status": "affected", "version": "4.011" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-2072", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T17:28:29.773714Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T17:29:16.646Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerMonitor 1000", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V4.011" } ] } ], "datePublic": "2023-07-11T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. \u0026nbsp;The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. \u00a0The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-11T13:05:56.994Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cul\u003e\u003cli\u003eCustomers should upgrade to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx?crumb=113\u0026amp;versions=58300,55146,54770\"\u003eV4.019\u003c/a\u003e\u0026nbsp;which mitigates this issue\u003c/li\u003e\u003c/ul\u003e\n\n\u003cbr\u003e" } ], "value": "\n * Customers should upgrade to V4.019 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx \u00a0which mitigates this issue\n\n\n\n\n\n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Rockwell Automation PowerMonitor 1000 Cross-Site Scripting Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2023-2072", "datePublished": "2023-07-11T13:05:56.994Z", "dateReserved": "2023-04-14T18:04:06.540Z", "dateUpdated": "2024-11-07T17:29:16.646Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }