Search criteria

9 vulnerabilities found for nr8h_firmware by cbc

FKIE_CVE-2023-40144

Vulnerability from fkie_nvd - Published: 2023-08-23 04:15 - Updated: 2024-11-21 08:18
Summary
OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr4h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "440E2421-F16E-4EF7-91E7-11C2E88E158A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D09FCA-C931-4149-9593-DDAACACF989A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFC121D8-6114-46DB-85D5-B42BADED711F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DB9F041-9B98-4B9B-B955-44F286DCB6B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr16h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22367B7F-747B-47B2-A77A-1EB313C6DC1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9F9B6CD-076C-470E-B2F5-8F95B748205B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16f42a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "393123C5-C07A-49D2-9048-D05F0DBA21A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16f42a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E7AEB-5918-4A72-BB30-CCDE5D76B611",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16f45at_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C12A869-BFEB-4AD6-B42E-3B7C201C0469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16f45at:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA6A51A-413C-4D9E-ADA7-CB020C842A40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8f42a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CC2787-3556-4ABD-B421-D33F739F8BA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8f42a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FBC8856-A81F-4940-9AC5-0B2837E85B59",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8f45at_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD422B3-3629-41A8-9AFE-546DAA6D9AB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8f45at:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD260198-596B-4652-821E-EEF76DDCB009",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4fx1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567B4EA0-BDFF-4776-97C7-6BA7922C3A81",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4fx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "790B191A-587B-46A8-BDD3-7490CA0386AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C72656-A5D6-4EC1-8783-4126A8467B49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC904C3-9968-44E8-A950-2063EFED7594",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857C045C-7B05-418A-9B76-F7CF92DC3529",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE22FB36-8C63-4043-B946-5B0B52AAA673",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9848D33D-856B-48F6-9B22-39C484FAE517",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E6F86D-5096-4E57-AC87-AD7C2A5FDD89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:drh8-4m41-a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5FA22C-14B2-4D5D-8CAF-FB639D8D7413",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:drh8-4m41-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7429E425-CEE9-4EFA-BEC9-540B05C14D2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8-4m71_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC4FE6A-CE54-4832-86D3-EF657D0CCABE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8-4m71:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE82830E-3175-4E01-BFE1-1AC6BB0BBC56",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8-8m72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842DE8A0-42DA-4FA6-A1C7-B0BCF1AAE6AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8-8m72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3859842-DDD5-42C4-9851-53F5B57C3BDB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E83004-3CBA-49FF-A56B-31D1C43C9AD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7388B198-7FC7-425C-9010-6318152C31C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16f85-8pra_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E73FFD18-D02D-4839-8B96-329ADA023E25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16f85-8pra:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F65A63D-6E18-4E8B-B522-29D779FCCC02",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16f82-16p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB2DD05-9395-4FC1-9373-4E3E62E5466A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16f82-16p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF663900-CCEE-4B7B-9B0F-FDC5ED6A9BC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-4f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A17C2D93-CC7D-49A7-9DC2-0904D49B5B1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B970D5-2B50-428B-99E2-26FAF58AF3AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-8f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "075EB5D7-3393-42DB-B02B-9EB95FFEB581",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC92528-D4E9-4FA0-8DF0-B77B0906D172",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16m52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5857E49-3622-4D19-A4D0-7722073B6EB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16m52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20DD9CAB-6C1F-4F58-86FF-55FABCAECFA6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16m52-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BD6EAFC-C0E9-48E2-BFCB-4F68C2E96B52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16m52-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B150D004-A32C-4EDC-B2DC-96E073ECA355",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8m52-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D58A580-4F08-4AD7-A05B-9DDDC80FC94A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8m52-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3678B910-1E58-4735-9C48-14192BDA08AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4m51-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBB9F25-40E3-45AB-A6C6-BA150D065978",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4m51-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D9746-08BA-4747-BDD5-4A481232BF06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
    }
  ],
  "id": "CVE-2023-40144",
  "lastModified": "2024-11-21T08:18:51.890",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-23T04:15:10.960",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Product"
      ],
      "url": "https://download.ganzsecurity.pl/"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU92545432/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://download.ganzsecurity.pl/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU92545432/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-38585

Vulnerability from fkie_nvd - Published: 2023-08-23 03:15 - Updated: 2024-11-21 08:13
Summary
Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr4h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "440E2421-F16E-4EF7-91E7-11C2E88E158A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D09FCA-C931-4149-9593-DDAACACF989A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFC121D8-6114-46DB-85D5-B42BADED711F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DB9F041-9B98-4B9B-B955-44F286DCB6B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr16h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22367B7F-747B-47B2-A77A-1EB313C6DC1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9F9B6CD-076C-470E-B2F5-8F95B748205B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16f42a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "393123C5-C07A-49D2-9048-D05F0DBA21A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16f42a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E7AEB-5918-4A72-BB30-CCDE5D76B611",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16f45at_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C12A869-BFEB-4AD6-B42E-3B7C201C0469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16f45at:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA6A51A-413C-4D9E-ADA7-CB020C842A40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8f42a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CC2787-3556-4ABD-B421-D33F739F8BA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8f42a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FBC8856-A81F-4940-9AC5-0B2837E85B59",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8f45at_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD422B3-3629-41A8-9AFE-546DAA6D9AB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8f45at:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD260198-596B-4652-821E-EEF76DDCB009",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4fx1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567B4EA0-BDFF-4776-97C7-6BA7922C3A81",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4fx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "790B191A-587B-46A8-BDD3-7490CA0386AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C72656-A5D6-4EC1-8783-4126A8467B49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC904C3-9968-44E8-A950-2063EFED7594",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857C045C-7B05-418A-9B76-F7CF92DC3529",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE22FB36-8C63-4043-B946-5B0B52AAA673",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9848D33D-856B-48F6-9B22-39C484FAE517",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E6F86D-5096-4E57-AC87-AD7C2A5FDD89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:drh8-4m41-a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5FA22C-14B2-4D5D-8CAF-FB639D8D7413",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:drh8-4m41-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7429E425-CEE9-4EFA-BEC9-540B05C14D2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8-4m71_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC4FE6A-CE54-4832-86D3-EF657D0CCABE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8-4m71:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE82830E-3175-4E01-BFE1-1AC6BB0BBC56",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8-8m72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842DE8A0-42DA-4FA6-A1C7-B0BCF1AAE6AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8-8m72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3859842-DDD5-42C4-9851-53F5B57C3BDB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E83004-3CBA-49FF-A56B-31D1C43C9AD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7388B198-7FC7-425C-9010-6318152C31C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16f85-8pra_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E73FFD18-D02D-4839-8B96-329ADA023E25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16f85-8pra:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F65A63D-6E18-4E8B-B522-29D779FCCC02",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16f82-16p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB2DD05-9395-4FC1-9373-4E3E62E5466A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16f82-16p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF663900-CCEE-4B7B-9B0F-FDC5ED6A9BC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-4f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A17C2D93-CC7D-49A7-9DC2-0904D49B5B1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B970D5-2B50-428B-99E2-26FAF58AF3AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-8f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "075EB5D7-3393-42DB-B02B-9EB95FFEB581",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC92528-D4E9-4FA0-8DF0-B77B0906D172",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16m52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5857E49-3622-4D19-A4D0-7722073B6EB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16m52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20DD9CAB-6C1F-4F58-86FF-55FABCAECFA6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16m52-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BD6EAFC-C0E9-48E2-BFCB-4F68C2E96B52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16m52-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B150D004-A32C-4EDC-B2DC-96E073ECA355",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8m52-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D58A580-4F08-4AD7-A05B-9DDDC80FC94A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8m52-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3678B910-1E58-4735-9C48-14192BDA08AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4m51-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBB9F25-40E3-45AB-A6C6-BA150D065978",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4m51-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D9746-08BA-4747-BDD5-4A481232BF06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
    }
  ],
  "id": "CVE-2023-38585",
  "lastModified": "2024-11-21T08:13:52.893",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-23T03:15:08.003",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Product"
      ],
      "url": "https://download.ganzsecurity.pl/"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU92545432/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://download.ganzsecurity.pl/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU92545432/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-40158

Vulnerability from fkie_nvd - Published: 2023-08-23 03:15 - Updated: 2024-11-21 08:18
Summary
Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr4h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "440E2421-F16E-4EF7-91E7-11C2E88E158A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D09FCA-C931-4149-9593-DDAACACF989A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFC121D8-6114-46DB-85D5-B42BADED711F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DB9F041-9B98-4B9B-B955-44F286DCB6B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr16h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22367B7F-747B-47B2-A77A-1EB313C6DC1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9F9B6CD-076C-470E-B2F5-8F95B748205B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16f42a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "393123C5-C07A-49D2-9048-D05F0DBA21A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16f42a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E7AEB-5918-4A72-BB30-CCDE5D76B611",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16f45at_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C12A869-BFEB-4AD6-B42E-3B7C201C0469",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16f45at:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA6A51A-413C-4D9E-ADA7-CB020C842A40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8f42a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CC2787-3556-4ABD-B421-D33F739F8BA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8f42a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FBC8856-A81F-4940-9AC5-0B2837E85B59",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8f45at_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD422B3-3629-41A8-9AFE-546DAA6D9AB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8f45at:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD260198-596B-4652-821E-EEF76DDCB009",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4fx1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567B4EA0-BDFF-4776-97C7-6BA7922C3A81",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4fx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "790B191A-587B-46A8-BDD3-7490CA0386AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C72656-A5D6-4EC1-8783-4126A8467B49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC904C3-9968-44E8-A950-2063EFED7594",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857C045C-7B05-418A-9B76-F7CF92DC3529",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE22FB36-8C63-4043-B946-5B0B52AAA673",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9848D33D-856B-48F6-9B22-39C484FAE517",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E6F86D-5096-4E57-AC87-AD7C2A5FDD89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:drh8-4m41-a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5FA22C-14B2-4D5D-8CAF-FB639D8D7413",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:drh8-4m41-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7429E425-CEE9-4EFA-BEC9-540B05C14D2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8-4m71_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC4FE6A-CE54-4832-86D3-EF657D0CCABE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8-4m71:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE82830E-3175-4E01-BFE1-1AC6BB0BBC56",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr8-8m72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842DE8A0-42DA-4FA6-A1C7-B0BCF1AAE6AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr8-8m72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3859842-DDD5-42C4-9851-53F5B57C3BDB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E83004-3CBA-49FF-A56B-31D1C43C9AD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7388B198-7FC7-425C-9010-6318152C31C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16f85-8pra_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E73FFD18-D02D-4839-8B96-329ADA023E25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16f85-8pra:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F65A63D-6E18-4E8B-B522-29D779FCCC02",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-16f82-16p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB2DD05-9395-4FC1-9373-4E3E62E5466A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-16f82-16p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF663900-CCEE-4B7B-9B0F-FDC5ED6A9BC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-4f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A17C2D93-CC7D-49A7-9DC2-0904D49B5B1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B970D5-2B50-428B-99E2-26FAF58AF3AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:nr-8f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "075EB5D7-3393-42DB-B02B-9EB95FFEB581",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC92528-D4E9-4FA0-8DF0-B77B0906D172",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16m52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5857E49-3622-4D19-A4D0-7722073B6EB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16m52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20DD9CAB-6C1F-4F58-86FF-55FABCAECFA6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-16m52-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BD6EAFC-C0E9-48E2-BFCB-4F68C2E96B52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-16m52-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B150D004-A32C-4EDC-B2DC-96E073ECA355",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-8m52-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D58A580-4F08-4AD7-A05B-9DDDC80FC94A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-8m52-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3678B910-1E58-4735-9C48-14192BDA08AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cbc:dr-4m51-av_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBB9F25-40E3-45AB-A6C6-BA150D065978",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cbc:dr-4m51-av:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D9746-08BA-4747-BDD5-4A481232BF06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
    }
  ],
  "id": "CVE-2023-40158",
  "lastModified": "2024-11-21T08:18:53.610",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-08-23T03:15:08.397",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Product"
      ],
      "url": "https://download.ganzsecurity.pl/"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU92545432/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://download.ganzsecurity.pl/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU92545432/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-912"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

CVE-2023-40144 (GCVE-0-2023-40144)

Vulnerability from cvelistv5 – Published: 2023-08-23 03:09 – Updated: 2024-08-02 18:24
VLAI?
Summary
OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
No CVSS data available.
CWE
  • OS command injection
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:24:55.653Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://download.ganzsecurity.pl/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU92545432/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NR4H, NR8H, NR16H series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4M, NR-8M, NR-16M series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4F, NR-8F, NR-16F series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16M, DR-8M, DR-4M51 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "OS command injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-23T03:09:26.960Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://download.ganzsecurity.pl/"
        },
        {
          "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU92545432/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2023-40144",
    "datePublished": "2023-08-23T03:09:26.960Z",
    "dateReserved": "2023-08-10T08:28:15.173Z",
    "dateUpdated": "2024-08-02T18:24:55.653Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-40158 (GCVE-0-2023-40158)

Vulnerability from cvelistv5 – Published: 2023-08-23 02:51 – Updated: 2024-10-11 21:56
VLAI?
Summary
Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
CWE
  • Hidden Functionality
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:24:55.605Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://download.ganzsecurity.pl/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU92545432/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-4f:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-4f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-16h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-8h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-4h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-4m41:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-4m41",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-4m:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-4m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr4h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr8h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr16h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-16f:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-16f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-8f:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-8f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-8m:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-8m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-16m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-4f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-8f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-16f:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-16f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-16m:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-16m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-8m:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-8m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cbc:dr-4m51:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-4m51",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-40158",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-11T16:48:57.666993Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-912",
                "description": "CWE-912 Hidden Functionality",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-11T21:56:59.562Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NR4H, NR8H, NR16H series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4M, NR-8M, NR-16M series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4F, NR-8F, NR-16F series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16M, DR-8M, DR-4M51 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Hidden Functionality",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-23T02:51:29.372Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://download.ganzsecurity.pl/"
        },
        {
          "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU92545432/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2023-40158",
    "datePublished": "2023-08-23T02:51:29.372Z",
    "dateReserved": "2023-08-10T08:28:15.997Z",
    "dateUpdated": "2024-10-11T21:56:59.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-38585 (GCVE-0-2023-38585)

Vulnerability from cvelistv5 – Published: 2023-08-23 02:51 – Updated: 2024-08-02 17:46
VLAI?
Summary
Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
No CVSS data available.
CWE
  • Improper authentication
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:46:55.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://download.ganzsecurity.pl/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU92545432/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NR4H, NR8H, NR16H series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4M, NR-8M, NR-16M series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4F, NR-8F, NR-16F series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16M, DR-8M, DR-4M51 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper authentication",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-23T02:51:09.660Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://download.ganzsecurity.pl/"
        },
        {
          "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU92545432/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2023-38585",
    "datePublished": "2023-08-23T02:51:09.660Z",
    "dateReserved": "2023-08-10T08:28:14.147Z",
    "dateUpdated": "2024-08-02T17:46:55.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-40144 (GCVE-0-2023-40144)

Vulnerability from nvd – Published: 2023-08-23 03:09 – Updated: 2024-08-02 18:24
VLAI?
Summary
OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
No CVSS data available.
CWE
  • OS command injection
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:24:55.653Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://download.ganzsecurity.pl/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU92545432/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NR4H, NR8H, NR16H series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4M, NR-8M, NR-16M series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4F, NR-8F, NR-16F series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16M, DR-8M, DR-4M51 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "OS command injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-23T03:09:26.960Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://download.ganzsecurity.pl/"
        },
        {
          "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU92545432/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2023-40144",
    "datePublished": "2023-08-23T03:09:26.960Z",
    "dateReserved": "2023-08-10T08:28:15.173Z",
    "dateUpdated": "2024-08-02T18:24:55.653Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-40158 (GCVE-0-2023-40158)

Vulnerability from nvd – Published: 2023-08-23 02:51 – Updated: 2024-10-11 21:56
VLAI?
Summary
Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
CWE
  • Hidden Functionality
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:24:55.605Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://download.ganzsecurity.pl/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU92545432/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-4f:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-4f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-16h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-8h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-4h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-4m41:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-4m41",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-4m:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-4m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr4h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr8h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr16h",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-16f:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-16f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-8f:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-8f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-8m:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-8m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-16m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-4f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-8f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:nr-16f:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nr-16f",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-16m:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-16m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:cbc:dr-8m:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-8m",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cbc:dr-4m51:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dr-4m51",
            "vendor": "cbc",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-40158",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-11T16:48:57.666993Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-912",
                "description": "CWE-912 Hidden Functionality",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-11T21:56:59.562Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NR4H, NR8H, NR16H series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4M, NR-8M, NR-16M series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4F, NR-8F, NR-16F series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16M, DR-8M, DR-4M51 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Hidden Functionality",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-23T02:51:29.372Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://download.ganzsecurity.pl/"
        },
        {
          "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU92545432/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2023-40158",
    "datePublished": "2023-08-23T02:51:29.372Z",
    "dateReserved": "2023-08-10T08:28:15.997Z",
    "dateUpdated": "2024-10-11T21:56:59.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-38585 (GCVE-0-2023-38585)

Vulnerability from nvd – Published: 2023-08-23 02:51 – Updated: 2024-08-02 17:46
VLAI?
Summary
Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
No CVSS data available.
CWE
  • Improper authentication
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:46:55.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://download.ganzsecurity.pl/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU92545432/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NR4H, NR8H, NR16H series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4M, NR-8M, NR-16M series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "NR-4F, NR-8F, NR-16F series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        },
        {
          "product": "DR-16M, DR-8M, DR-4M51 series",
          "vendor": "CBC Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "firmware all versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper authentication",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-23T02:51:09.660Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://download.ganzsecurity.pl/"
        },
        {
          "url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU92545432/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2023-38585",
    "datePublished": "2023-08-23T02:51:09.660Z",
    "dateReserved": "2023-08-10T08:28:14.147Z",
    "dateUpdated": "2024-08-02T17:46:55.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}