Search criteria
9 vulnerabilities found for nr8h_firmware by cbc
FKIE_CVE-2023-40144
Vulnerability from fkie_nvd - Published: 2023-08-23 04:15 - Updated: 2024-11-21 08:18
Severity ?
Summary
OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cbc | nr4h_firmware | - | |
| cbc | nr4h | - | |
| cbc | nr8h_firmware | - | |
| cbc | nr8h | - | |
| cbc | nr16h_firmware | - | |
| cbc | nr16h | - | |
| cbc | dr-16f42a_firmware | - | |
| cbc | dr-16f42a | - | |
| cbc | dr-16f45at_firmware | - | |
| cbc | dr-16f45at | - | |
| cbc | dr-8f42a_firmware | - | |
| cbc | dr-8f42a | - | |
| cbc | dr-8f45at_firmware | - | |
| cbc | dr-8f45at | - | |
| cbc | dr-4fx1_firmware | - | |
| cbc | dr-4fx1 | - | |
| cbc | dr-16h_firmware | - | |
| cbc | dr-16h | - | |
| cbc | dr-8h_firmware | - | |
| cbc | dr-8h | - | |
| cbc | dr-4h_firmware | - | |
| cbc | dr-4h | - | |
| cbc | drh8-4m41-a_firmware | - | |
| cbc | drh8-4m41-a | - | |
| cbc | nr8-4m71_firmware | - | |
| cbc | nr8-4m71 | - | |
| cbc | nr8-8m72_firmware | - | |
| cbc | nr8-8m72 | - | |
| cbc | nr-16m_firmware | - | |
| cbc | nr-16m | - | |
| cbc | nr-16f85-8pra_firmware | - | |
| cbc | nr-16f85-8pra | - | |
| cbc | nr-16f82-16p_firmware | - | |
| cbc | nr-16f82-16p | - | |
| cbc | nr-4f_firmware | - | |
| cbc | nr-4f | - | |
| cbc | nr-8f_firmware | - | |
| cbc | nr-8f | - | |
| cbc | dr-16m52_firmware | - | |
| cbc | dr-16m52 | - | |
| cbc | dr-16m52-av_firmware | - | |
| cbc | dr-16m52-av | - | |
| cbc | dr-8m52-av_firmware | - | |
| cbc | dr-8m52-av | - | |
| cbc | dr-4m51-av_firmware | - | |
| cbc | dr-4m51-av | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr4h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440E2421-F16E-4EF7-91E7-11C2E88E158A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09D09FCA-C931-4149-9593-DDAACACF989A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC121D8-6114-46DB-85D5-B42BADED711F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB9F041-9B98-4B9B-B955-44F286DCB6B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr16h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22367B7F-747B-47B2-A77A-1EB313C6DC1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F9B6CD-076C-470E-B2F5-8F95B748205B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16f42a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "393123C5-C07A-49D2-9048-D05F0DBA21A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16f42a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E7AEB-5918-4A72-BB30-CCDE5D76B611",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16f45at_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C12A869-BFEB-4AD6-B42E-3B7C201C0469",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16f45at:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA6A51A-413C-4D9E-ADA7-CB020C842A40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8f42a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13CC2787-3556-4ABD-B421-D33F739F8BA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8f42a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBC8856-A81F-4940-9AC5-0B2837E85B59",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8f45at_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD422B3-3629-41A8-9AFE-546DAA6D9AB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8f45at:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD260198-596B-4652-821E-EEF76DDCB009",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4fx1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "567B4EA0-BDFF-4776-97C7-6BA7922C3A81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4fx1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "790B191A-587B-46A8-BDD3-7490CA0386AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C72656-A5D6-4EC1-8783-4126A8467B49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC904C3-9968-44E8-A950-2063EFED7594",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "857C045C-7B05-418A-9B76-F7CF92DC3529",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE22FB36-8C63-4043-B946-5B0B52AAA673",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9848D33D-856B-48F6-9B22-39C484FAE517",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E6F86D-5096-4E57-AC87-AD7C2A5FDD89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:drh8-4m41-a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5FA22C-14B2-4D5D-8CAF-FB639D8D7413",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:drh8-4m41-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7429E425-CEE9-4EFA-BEC9-540B05C14D2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8-4m71_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC4FE6A-CE54-4832-86D3-EF657D0CCABE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8-4m71:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE82830E-3175-4E01-BFE1-1AC6BB0BBC56",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8-8m72_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "842DE8A0-42DA-4FA6-A1C7-B0BCF1AAE6AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8-8m72:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3859842-DDD5-42C4-9851-53F5B57C3BDB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38E83004-3CBA-49FF-A56B-31D1C43C9AD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7388B198-7FC7-425C-9010-6318152C31C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16f85-8pra_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E73FFD18-D02D-4839-8B96-329ADA023E25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16f85-8pra:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F65A63D-6E18-4E8B-B522-29D779FCCC02",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16f82-16p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB2DD05-9395-4FC1-9373-4E3E62E5466A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16f82-16p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF663900-CCEE-4B7B-9B0F-FDC5ED6A9BC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-4f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A17C2D93-CC7D-49A7-9DC2-0904D49B5B1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86B970D5-2B50-428B-99E2-26FAF58AF3AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-8f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "075EB5D7-3393-42DB-B02B-9EB95FFEB581",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC92528-D4E9-4FA0-8DF0-B77B0906D172",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16m52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5857E49-3622-4D19-A4D0-7722073B6EB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16m52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20DD9CAB-6C1F-4F58-86FF-55FABCAECFA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16m52-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD6EAFC-C0E9-48E2-BFCB-4F68C2E96B52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16m52-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B150D004-A32C-4EDC-B2DC-96E073ECA355",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8m52-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D58A580-4F08-4AD7-A05B-9DDDC80FC94A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8m52-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3678B910-1E58-4735-9C48-14192BDA08AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4m51-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BBB9F25-40E3-45AB-A6C6-BA150D065978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4m51-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487D9746-08BA-4747-BDD5-4A481232BF06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"id": "CVE-2023-40144",
"lastModified": "2024-11-21T08:18:51.890",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-23T04:15:10.960",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-38585
Vulnerability from fkie_nvd - Published: 2023-08-23 03:15 - Updated: 2024-11-21 08:13
Severity ?
Summary
Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cbc | nr4h_firmware | - | |
| cbc | nr4h | - | |
| cbc | nr8h_firmware | - | |
| cbc | nr8h | - | |
| cbc | nr16h_firmware | - | |
| cbc | nr16h | - | |
| cbc | dr-16f42a_firmware | - | |
| cbc | dr-16f42a | - | |
| cbc | dr-16f45at_firmware | - | |
| cbc | dr-16f45at | - | |
| cbc | dr-8f42a_firmware | - | |
| cbc | dr-8f42a | - | |
| cbc | dr-8f45at_firmware | - | |
| cbc | dr-8f45at | - | |
| cbc | dr-4fx1_firmware | - | |
| cbc | dr-4fx1 | - | |
| cbc | dr-16h_firmware | - | |
| cbc | dr-16h | - | |
| cbc | dr-8h_firmware | - | |
| cbc | dr-8h | - | |
| cbc | dr-4h_firmware | - | |
| cbc | dr-4h | - | |
| cbc | drh8-4m41-a_firmware | - | |
| cbc | drh8-4m41-a | - | |
| cbc | nr8-4m71_firmware | - | |
| cbc | nr8-4m71 | - | |
| cbc | nr8-8m72_firmware | - | |
| cbc | nr8-8m72 | - | |
| cbc | nr-16m_firmware | - | |
| cbc | nr-16m | - | |
| cbc | nr-16f85-8pra_firmware | - | |
| cbc | nr-16f85-8pra | - | |
| cbc | nr-16f82-16p_firmware | - | |
| cbc | nr-16f82-16p | - | |
| cbc | nr-4f_firmware | - | |
| cbc | nr-4f | - | |
| cbc | nr-8f_firmware | - | |
| cbc | nr-8f | - | |
| cbc | dr-16m52_firmware | - | |
| cbc | dr-16m52 | - | |
| cbc | dr-16m52-av_firmware | - | |
| cbc | dr-16m52-av | - | |
| cbc | dr-8m52-av_firmware | - | |
| cbc | dr-8m52-av | - | |
| cbc | dr-4m51-av_firmware | - | |
| cbc | dr-4m51-av | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr4h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440E2421-F16E-4EF7-91E7-11C2E88E158A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09D09FCA-C931-4149-9593-DDAACACF989A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC121D8-6114-46DB-85D5-B42BADED711F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB9F041-9B98-4B9B-B955-44F286DCB6B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr16h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22367B7F-747B-47B2-A77A-1EB313C6DC1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F9B6CD-076C-470E-B2F5-8F95B748205B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16f42a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "393123C5-C07A-49D2-9048-D05F0DBA21A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16f42a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E7AEB-5918-4A72-BB30-CCDE5D76B611",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16f45at_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C12A869-BFEB-4AD6-B42E-3B7C201C0469",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16f45at:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA6A51A-413C-4D9E-ADA7-CB020C842A40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8f42a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13CC2787-3556-4ABD-B421-D33F739F8BA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8f42a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBC8856-A81F-4940-9AC5-0B2837E85B59",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8f45at_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD422B3-3629-41A8-9AFE-546DAA6D9AB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8f45at:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD260198-596B-4652-821E-EEF76DDCB009",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4fx1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "567B4EA0-BDFF-4776-97C7-6BA7922C3A81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4fx1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "790B191A-587B-46A8-BDD3-7490CA0386AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C72656-A5D6-4EC1-8783-4126A8467B49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC904C3-9968-44E8-A950-2063EFED7594",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "857C045C-7B05-418A-9B76-F7CF92DC3529",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE22FB36-8C63-4043-B946-5B0B52AAA673",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9848D33D-856B-48F6-9B22-39C484FAE517",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E6F86D-5096-4E57-AC87-AD7C2A5FDD89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:drh8-4m41-a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5FA22C-14B2-4D5D-8CAF-FB639D8D7413",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:drh8-4m41-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7429E425-CEE9-4EFA-BEC9-540B05C14D2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8-4m71_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC4FE6A-CE54-4832-86D3-EF657D0CCABE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8-4m71:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE82830E-3175-4E01-BFE1-1AC6BB0BBC56",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8-8m72_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "842DE8A0-42DA-4FA6-A1C7-B0BCF1AAE6AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8-8m72:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3859842-DDD5-42C4-9851-53F5B57C3BDB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38E83004-3CBA-49FF-A56B-31D1C43C9AD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7388B198-7FC7-425C-9010-6318152C31C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16f85-8pra_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E73FFD18-D02D-4839-8B96-329ADA023E25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16f85-8pra:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F65A63D-6E18-4E8B-B522-29D779FCCC02",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16f82-16p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB2DD05-9395-4FC1-9373-4E3E62E5466A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16f82-16p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF663900-CCEE-4B7B-9B0F-FDC5ED6A9BC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-4f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A17C2D93-CC7D-49A7-9DC2-0904D49B5B1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86B970D5-2B50-428B-99E2-26FAF58AF3AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-8f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "075EB5D7-3393-42DB-B02B-9EB95FFEB581",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC92528-D4E9-4FA0-8DF0-B77B0906D172",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16m52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5857E49-3622-4D19-A4D0-7722073B6EB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16m52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20DD9CAB-6C1F-4F58-86FF-55FABCAECFA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16m52-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD6EAFC-C0E9-48E2-BFCB-4F68C2E96B52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16m52-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B150D004-A32C-4EDC-B2DC-96E073ECA355",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8m52-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D58A580-4F08-4AD7-A05B-9DDDC80FC94A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8m52-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3678B910-1E58-4735-9C48-14192BDA08AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4m51-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BBB9F25-40E3-45AB-A6C6-BA150D065978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4m51-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487D9746-08BA-4747-BDD5-4A481232BF06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"id": "CVE-2023-38585",
"lastModified": "2024-11-21T08:13:52.893",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-23T03:15:08.003",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-40158
Vulnerability from fkie_nvd - Published: 2023-08-23 03:15 - Updated: 2024-11-21 08:18
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cbc | nr4h_firmware | - | |
| cbc | nr4h | - | |
| cbc | nr8h_firmware | - | |
| cbc | nr8h | - | |
| cbc | nr16h_firmware | - | |
| cbc | nr16h | - | |
| cbc | dr-16f42a_firmware | - | |
| cbc | dr-16f42a | - | |
| cbc | dr-16f45at_firmware | - | |
| cbc | dr-16f45at | - | |
| cbc | dr-8f42a_firmware | - | |
| cbc | dr-8f42a | - | |
| cbc | dr-8f45at_firmware | - | |
| cbc | dr-8f45at | - | |
| cbc | dr-4fx1_firmware | - | |
| cbc | dr-4fx1 | - | |
| cbc | dr-16h_firmware | - | |
| cbc | dr-16h | - | |
| cbc | dr-8h_firmware | - | |
| cbc | dr-8h | - | |
| cbc | dr-4h_firmware | - | |
| cbc | dr-4h | - | |
| cbc | drh8-4m41-a_firmware | - | |
| cbc | drh8-4m41-a | - | |
| cbc | nr8-4m71_firmware | - | |
| cbc | nr8-4m71 | - | |
| cbc | nr8-8m72_firmware | - | |
| cbc | nr8-8m72 | - | |
| cbc | nr-16m_firmware | - | |
| cbc | nr-16m | - | |
| cbc | nr-16f85-8pra_firmware | - | |
| cbc | nr-16f85-8pra | - | |
| cbc | nr-16f82-16p_firmware | - | |
| cbc | nr-16f82-16p | - | |
| cbc | nr-4f_firmware | - | |
| cbc | nr-4f | - | |
| cbc | nr-8f_firmware | - | |
| cbc | nr-8f | - | |
| cbc | dr-16m52_firmware | - | |
| cbc | dr-16m52 | - | |
| cbc | dr-16m52-av_firmware | - | |
| cbc | dr-16m52-av | - | |
| cbc | dr-8m52-av_firmware | - | |
| cbc | dr-8m52-av | - | |
| cbc | dr-4m51-av_firmware | - | |
| cbc | dr-4m51-av | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr4h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440E2421-F16E-4EF7-91E7-11C2E88E158A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09D09FCA-C931-4149-9593-DDAACACF989A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC121D8-6114-46DB-85D5-B42BADED711F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB9F041-9B98-4B9B-B955-44F286DCB6B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr16h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22367B7F-747B-47B2-A77A-1EB313C6DC1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F9B6CD-076C-470E-B2F5-8F95B748205B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16f42a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "393123C5-C07A-49D2-9048-D05F0DBA21A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16f42a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E7AEB-5918-4A72-BB30-CCDE5D76B611",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16f45at_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C12A869-BFEB-4AD6-B42E-3B7C201C0469",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16f45at:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA6A51A-413C-4D9E-ADA7-CB020C842A40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8f42a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13CC2787-3556-4ABD-B421-D33F739F8BA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8f42a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBC8856-A81F-4940-9AC5-0B2837E85B59",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8f45at_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD422B3-3629-41A8-9AFE-546DAA6D9AB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8f45at:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD260198-596B-4652-821E-EEF76DDCB009",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4fx1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "567B4EA0-BDFF-4776-97C7-6BA7922C3A81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4fx1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "790B191A-587B-46A8-BDD3-7490CA0386AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C72656-A5D6-4EC1-8783-4126A8467B49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC904C3-9968-44E8-A950-2063EFED7594",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "857C045C-7B05-418A-9B76-F7CF92DC3529",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE22FB36-8C63-4043-B946-5B0B52AAA673",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9848D33D-856B-48F6-9B22-39C484FAE517",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E6F86D-5096-4E57-AC87-AD7C2A5FDD89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:drh8-4m41-a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5FA22C-14B2-4D5D-8CAF-FB639D8D7413",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:drh8-4m41-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7429E425-CEE9-4EFA-BEC9-540B05C14D2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8-4m71_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC4FE6A-CE54-4832-86D3-EF657D0CCABE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8-4m71:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE82830E-3175-4E01-BFE1-1AC6BB0BBC56",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr8-8m72_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "842DE8A0-42DA-4FA6-A1C7-B0BCF1AAE6AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr8-8m72:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3859842-DDD5-42C4-9851-53F5B57C3BDB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38E83004-3CBA-49FF-A56B-31D1C43C9AD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7388B198-7FC7-425C-9010-6318152C31C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16f85-8pra_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E73FFD18-D02D-4839-8B96-329ADA023E25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16f85-8pra:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F65A63D-6E18-4E8B-B522-29D779FCCC02",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-16f82-16p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB2DD05-9395-4FC1-9373-4E3E62E5466A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-16f82-16p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF663900-CCEE-4B7B-9B0F-FDC5ED6A9BC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-4f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A17C2D93-CC7D-49A7-9DC2-0904D49B5B1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86B970D5-2B50-428B-99E2-26FAF58AF3AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:nr-8f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "075EB5D7-3393-42DB-B02B-9EB95FFEB581",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC92528-D4E9-4FA0-8DF0-B77B0906D172",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16m52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5857E49-3622-4D19-A4D0-7722073B6EB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16m52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20DD9CAB-6C1F-4F58-86FF-55FABCAECFA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-16m52-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD6EAFC-C0E9-48E2-BFCB-4F68C2E96B52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-16m52-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B150D004-A32C-4EDC-B2DC-96E073ECA355",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-8m52-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D58A580-4F08-4AD7-A05B-9DDDC80FC94A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-8m52-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3678B910-1E58-4735-9C48-14192BDA08AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cbc:dr-4m51-av_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BBB9F25-40E3-45AB-A6C6-BA150D065978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cbc:dr-4m51-av:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487D9746-08BA-4747-BDD5-4A481232BF06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"id": "CVE-2023-40158",
"lastModified": "2024-11-21T08:18:53.610",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-08-23T03:15:08.397",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-912"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CVE-2023-40144 (GCVE-0-2023-40144)
Vulnerability from cvelistv5 – Published: 2023-08-23 03:09 – Updated: 2024-08-02 18:24
VLAI?
Summary
OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
No CVSS data available.
CWE
- OS command injection
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CBC Co.,Ltd. | NR4H, NR8H, NR16H series |
Affected:
firmware all versions
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:24:55.653Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"tags": [
"x_transferred"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NR4H, NR8H, NR16H series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4M, NR-8M, NR-16M series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4F, NR-8F, NR-16F series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16M, DR-8M, DR-4M51 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS command injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-23T03:09:26.960Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://download.ganzsecurity.pl/"
},
{
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-40144",
"datePublished": "2023-08-23T03:09:26.960Z",
"dateReserved": "2023-08-10T08:28:15.173Z",
"dateUpdated": "2024-08-02T18:24:55.653Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40158 (GCVE-0-2023-40158)
Vulnerability from cvelistv5 – Published: 2023-08-23 02:51 – Updated: 2024-10-11 21:56
VLAI?
Summary
Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
8.8 (High)
CWE
- Hidden Functionality
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CBC Co.,Ltd. | NR4H, NR8H, NR16H series |
Affected:
firmware all versions
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:24:55.605Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"tags": [
"x_transferred"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:cbc:dr-4f:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-4f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-16h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-8h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-4h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-4m41:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-4m41",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-4m:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-4m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr4h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr8h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr16h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-16f:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-16f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-8f:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-8f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-8m:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-8m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-16m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-4f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-8f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-16f:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-16f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-16m:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-16m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-8m:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-8m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cbc:dr-4m51:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-4m51",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-40158",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-11T16:48:57.666993Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-912",
"description": "CWE-912 Hidden Functionality",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T21:56:59.562Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "NR4H, NR8H, NR16H series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4M, NR-8M, NR-16M series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4F, NR-8F, NR-16F series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16M, DR-8M, DR-4M51 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Hidden Functionality",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-23T02:51:29.372Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://download.ganzsecurity.pl/"
},
{
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-40158",
"datePublished": "2023-08-23T02:51:29.372Z",
"dateReserved": "2023-08-10T08:28:15.997Z",
"dateUpdated": "2024-10-11T21:56:59.562Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-38585 (GCVE-0-2023-38585)
Vulnerability from cvelistv5 – Published: 2023-08-23 02:51 – Updated: 2024-08-02 17:46
VLAI?
Summary
Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
No CVSS data available.
CWE
- Improper authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CBC Co.,Ltd. | NR4H, NR8H, NR16H series |
Affected:
firmware all versions
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:46:55.839Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"tags": [
"x_transferred"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NR4H, NR8H, NR16H series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4M, NR-8M, NR-16M series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4F, NR-8F, NR-16F series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16M, DR-8M, DR-4M51 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper authentication",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-23T02:51:09.660Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://download.ganzsecurity.pl/"
},
{
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-38585",
"datePublished": "2023-08-23T02:51:09.660Z",
"dateReserved": "2023-08-10T08:28:14.147Z",
"dateUpdated": "2024-08-02T17:46:55.839Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40144 (GCVE-0-2023-40144)
Vulnerability from nvd – Published: 2023-08-23 03:09 – Updated: 2024-08-02 18:24
VLAI?
Summary
OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
No CVSS data available.
CWE
- OS command injection
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CBC Co.,Ltd. | NR4H, NR8H, NR16H series |
Affected:
firmware all versions
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:24:55.653Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"tags": [
"x_transferred"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NR4H, NR8H, NR16H series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4M, NR-8M, NR-16M series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4F, NR-8F, NR-16F series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16M, DR-8M, DR-4M51 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS command injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-23T03:09:26.960Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://download.ganzsecurity.pl/"
},
{
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-40144",
"datePublished": "2023-08-23T03:09:26.960Z",
"dateReserved": "2023-08-10T08:28:15.173Z",
"dateUpdated": "2024-08-02T18:24:55.653Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40158 (GCVE-0-2023-40158)
Vulnerability from nvd – Published: 2023-08-23 02:51 – Updated: 2024-10-11 21:56
VLAI?
Summary
Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
8.8 (High)
CWE
- Hidden Functionality
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CBC Co.,Ltd. | NR4H, NR8H, NR16H series |
Affected:
firmware all versions
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:24:55.605Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"tags": [
"x_transferred"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:cbc:dr-4f:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-4f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-16h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-16h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-8h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-8h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-4h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-4h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-4m41:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-4m41",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-4m:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-4m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr4h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr4h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr8h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr8h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr16h:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr16h",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-16f:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-16f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-8f:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-8f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-8m:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-8m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-16m:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-16m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-4f:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-4f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-8f:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-8f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:nr-16f:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nr-16f",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-16m:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-16m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:cbc:dr-8m:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-8m",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:cbc:dr-4m51:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dr-4m51",
"vendor": "cbc",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-40158",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-11T16:48:57.666993Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-912",
"description": "CWE-912 Hidden Functionality",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T21:56:59.562Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "NR4H, NR8H, NR16H series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4M, NR-8M, NR-16M series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4F, NR-8F, NR-16F series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16M, DR-8M, DR-4M51 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hidden functionality vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Hidden Functionality",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-23T02:51:29.372Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://download.ganzsecurity.pl/"
},
{
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-40158",
"datePublished": "2023-08-23T02:51:29.372Z",
"dateReserved": "2023-08-10T08:28:15.997Z",
"dateUpdated": "2024-10-11T21:56:59.562Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-38585 (GCVE-0-2023-38585)
Vulnerability from nvd – Published: 2023-08-23 02:51 – Updated: 2024-08-02 17:46
VLAI?
Summary
Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
Severity ?
No CVSS data available.
CWE
- Improper authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CBC Co.,Ltd. | NR4H, NR8H, NR16H series |
Affected:
firmware all versions
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:46:55.839Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://download.ganzsecurity.pl/"
},
{
"tags": [
"x_transferred"
],
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NR4H, NR8H, NR16H series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4M, NR-8M, NR-16M series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "NR-4F, NR-8F, NR-16F series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
},
{
"product": "DR-16M, DR-8M, DR-4M51 series",
"vendor": "CBC Co.,Ltd.",
"versions": [
{
"status": "affected",
"version": "firmware all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper authentication",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-23T02:51:09.660Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://download.ganzsecurity.pl/"
},
{
"url": "https://ganzsecurity.com/release/1578/digimasterpixelmaster-security-notice"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92545432/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-38585",
"datePublished": "2023-08-23T02:51:09.660Z",
"dateReserved": "2023-08-10T08:28:14.147Z",
"dateUpdated": "2024-08-02T17:46:55.839Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}