CVE-2023-36483 (GCVE-0-2023-36483)

Vulnerability from cvelistv5 – Published: 2024-03-16 00:00 – Updated: 2024-08-28 16:23
VLAI?
Summary
Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android  version 1.16.18 and earlier and MASmobile Classic iOS version 1.7.24 and earlier which allows remote attackers to retrieve sensitive data  including customer data, security system status, and event history.
CWE
  • CWE-639 - Authorization Bypass Through User-Controlled Key
Assigner
Credits
Joris Talma, independent .NET developer from The Netherlands, reported this vulnerability to Carrier.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:45:57.162Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.corporate.carrier.com/product-security/advisories-resources/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:carrier:masmobile_classic:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "masmobile_classic",
            "vendor": "carrier",
            "versions": [
              {
                "lessThanOrEqual": "1.16.18",
                "status": "affected",
                "version": "1",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "1.7.24",
                "status": "affected",
                "version": "1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:carrier:mas_asp.net_services:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mas_asp.net_services",
            "vendor": "carrier",
            "versions": [
              {
                "lessThanOrEqual": "1.9",
                "status": "affected",
                "version": "1",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-36483",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-18T15:09:34.432630Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T16:23:17.832Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Android"
          ],
          "product": "MASmobile Classic",
          "vendor": "MAS (a Carrier brand)",
          "versions": [
            {
              "lessThanOrEqual": "1.16.18",
              "status": "affected",
              "version": "1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "iOS"
          ],
          "product": "MASmobile Classic",
          "vendor": "MAS (a Carrier brand)",
          "versions": [
            {
              "lessThanOrEqual": "1.7.24",
              "status": "affected",
              "version": "1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MAS ASP.Net Services",
          "vendor": "MAS (a Carrier brand)",
          "versions": [
            {
              "lessThanOrEqual": "1.9",
              "status": "affected",
              "version": "1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Joris Talma, independent .NET developer from The Netherlands, reported this vulnerability to Carrier."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\u0026nbsp; version 1.16.18 and earlier and \n\nMASmobile Classic iOS version 1.7.24 and earlier\n\nwhich allows remote attackers to retrieve sensitive data\u0026nbsp; including customer data, security system status, and event history.\u003cbr\u003e"
            }
          ],
          "value": "Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\u00a0 version 1.16.18 and earlier and \n\nMASmobile Classic iOS version 1.7.24 and earlier\n\nwhich allows remote attackers to retrieve sensitive data\u00a0 including customer data, security system status, and event history.\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-59",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-59 Session Credential Falsification through Prediction"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-639",
              "description": "CWE-639 Authorization Bypass Through User-Controlled Key",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-21T21:23:21.767Z",
        "orgId": "e24e6442-3ae1-4538-a7b8-7ac95586db8f",
        "shortName": "Carrier"
      },
      "references": [
        {
          "url": "https://www.corporate.carrier.com/product-security/advisories-resources/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory.  To uninstall, unpublish the services in IIS and remove the service files.  All versions (v1.7, 1.8, and 1.9) were discontinued.\u003cbr\u003e2. Remove the MASmobile Classic app from Android and iOS devices.  All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore).\u003cbr\u003e3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later).  These services do not run under IIS and must be configured in coordination with the customer.\u003cbr\u003e4. Install MASmobile app from Play or AppStore (v2.x.x).  This is not an upgrade to MASmobile Classic; it is a different app."
            }
          ],
          "value": "1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory.  To uninstall, unpublish the services in IIS and remove the service files.  All versions (v1.7, 1.8, and 1.9) were discontinued.\n2. Remove the MASmobile Classic app from Android and iOS devices.  All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore).\n3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later).  These services do not run under IIS and must be configured in coordination with the customer.\n4. Install MASmobile app from Play or AppStore (v2.x.x).  This is not an upgrade to MASmobile Classic; it is a different app."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "MAS (a Carrier brand) MASmobile Classic Authorization Bypass",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e24e6442-3ae1-4538-a7b8-7ac95586db8f",
    "assignerShortName": "Carrier",
    "cveId": "CVE-2023-36483",
    "datePublished": "2024-03-16T00:00:00",
    "dateReserved": "2023-06-22T00:00:00",
    "dateUpdated": "2024-08-28T16:23:17.832Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\\u00a0 version 1.16.18 and earlier and \\n\\nMASmobile Classic iOS version 1.7.24 and earlier\\n\\nwhich allows remote attackers to retrieve sensitive data\\u00a0 including customer data, security system status, and event history.\\n\"}, {\"lang\": \"es\", \"value\": \"Se descubri\\u00f3 una omisi\\u00f3n de autorizaci\\u00f3n en la aplicaci\\u00f3n Carrier MASmobile Classic hasta la versi\\u00f3n 1.16.18 para Android, la aplicaci\\u00f3n MASmobile Classic hasta la 1.7.24 para iOS y los servicios MAS ASP.Net hasta la 1.9. Esto se puede lograr mediante la predicci\\u00f3n de ID de sesi\\u00f3n, lo que permite a atacantes remotos recuperar datos confidenciales, incluidos datos de clientes, estado del sistema de seguridad e historial de eventos. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. Los productos afectados no pueden simplemente actualizarse; deben eliminarse, pero pueden reemplazarse por otro software de Carrier como se explica en el aviso de Carrier.\"}]",
      "id": "CVE-2023-36483",
      "lastModified": "2024-11-21T08:09:48.380",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"productsecurity@carrier.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
      "published": "2024-03-16T05:15:18.577",
      "references": "[{\"url\": \"https://www.corporate.carrier.com/product-security/advisories-resources/\", \"source\": \"productsecurity@carrier.com\"}, {\"url\": \"https://www.corporate.carrier.com/product-security/advisories-resources/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "productsecurity@carrier.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"productsecurity@carrier.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-639\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-36483\",\"sourceIdentifier\":\"productsecurity@carrier.com\",\"published\":\"2024-03-16T05:15:18.577\",\"lastModified\":\"2024-11-21T08:09:48.380\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\u00a0 version 1.16.18 and earlier and \\n\\nMASmobile Classic iOS version 1.7.24 and earlier\\n\\nwhich allows remote attackers to retrieve sensitive data\u00a0 including customer data, security system status, and event history.\\n\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 una omisi\u00f3n de autorizaci\u00f3n en la aplicaci\u00f3n Carrier MASmobile Classic hasta la versi\u00f3n 1.16.18 para Android, la aplicaci\u00f3n MASmobile Classic hasta la 1.7.24 para iOS y los servicios MAS ASP.Net hasta la 1.9. Esto se puede lograr mediante la predicci\u00f3n de ID de sesi\u00f3n, lo que permite a atacantes remotos recuperar datos confidenciales, incluidos datos de clientes, estado del sistema de seguridad e historial de eventos. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. Los productos afectados no pueden simplemente actualizarse; deben eliminarse, pero pueden reemplazarse por otro software de Carrier como se explica en el aviso de Carrier.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"productsecurity@carrier.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"productsecurity@carrier.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-639\"}]}],\"references\":[{\"url\":\"https://www.corporate.carrier.com/product-security/advisories-resources/\",\"source\":\"productsecurity@carrier.com\"},{\"url\":\"https://www.corporate.carrier.com/product-security/advisories-resources/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.corporate.carrier.com/product-security/advisories-resources/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T16:45:57.162Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-36483\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-18T15:09:34.432630Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:carrier:masmobile_classic:*:*:*:*:*:*:*:*\"], \"vendor\": \"carrier\", \"product\": \"masmobile_classic\", \"versions\": [{\"status\": \"affected\", \"version\": \"1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.16.18\"}, {\"status\": \"affected\", \"version\": \"1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.7.24\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:carrier:mas_asp.net_services:*:*:*:*:*:*:*:*\"], \"vendor\": \"carrier\", \"product\": \"mas_asp.net_services\", \"versions\": [{\"status\": \"affected\", \"version\": \"1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.9\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-28T16:23:10.997Z\"}}], \"cna\": {\"title\": \"MAS (a Carrier brand) MASmobile Classic Authorization Bypass\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Joris Talma, independent .NET developer from The Netherlands, reported this vulnerability to Carrier.\"}], \"impacts\": [{\"capecId\": \"CAPEC-59\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-59 Session Credential Falsification through Prediction\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"MAS (a Carrier brand)\", \"product\": \"MASmobile Classic\", \"versions\": [{\"status\": \"affected\", \"version\": \"1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.16.18\"}], \"platforms\": [\"Android\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"MAS (a Carrier brand)\", \"product\": \"MASmobile Classic\", \"versions\": [{\"status\": \"affected\", \"version\": \"1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.7.24\"}], \"platforms\": [\"iOS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"MAS (a Carrier brand)\", \"product\": \"MAS ASP.Net Services\", \"versions\": [{\"status\": \"affected\", \"version\": \"1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.9\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory.  To uninstall, unpublish the services in IIS and remove the service files.  All versions (v1.7, 1.8, and 1.9) were discontinued.\\n2. Remove the MASmobile Classic app from Android and iOS devices.  All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore).\\n3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later).  These services do not run under IIS and must be configured in coordination with the customer.\\n4. Install MASmobile app from Play or AppStore (v2.x.x).  This is not an upgrade to MASmobile Classic; it is a different app.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory.  To uninstall, unpublish the services in IIS and remove the service files.  All versions (v1.7, 1.8, and 1.9) were discontinued.\u003cbr\u003e2. Remove the MASmobile Classic app from Android and iOS devices.  All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore).\u003cbr\u003e3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later).  These services do not run under IIS and must be configured in coordination with the customer.\u003cbr\u003e4. Install MASmobile app from Play or AppStore (v2.x.x).  This is not an upgrade to MASmobile Classic; it is a different app.\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.corporate.carrier.com/product-security/advisories-resources/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\\u00a0 version 1.16.18 and earlier and \\n\\nMASmobile Classic iOS version 1.7.24 and earlier\\n\\nwhich allows remote attackers to retrieve sensitive data\\u00a0 including customer data, security system status, and event history.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\u0026nbsp; version 1.16.18 and earlier and \\n\\nMASmobile Classic iOS version 1.7.24 and earlier\\n\\nwhich allows remote attackers to retrieve sensitive data\u0026nbsp; including customer data, security system status, and event history.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-639\", \"description\": \"CWE-639 Authorization Bypass Through User-Controlled Key\"}]}], \"providerMetadata\": {\"orgId\": \"e24e6442-3ae1-4538-a7b8-7ac95586db8f\", \"shortName\": \"Carrier\", \"dateUpdated\": \"2024-03-21T21:23:21.767Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-36483\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-28T16:23:17.832Z\", \"dateReserved\": \"2023-06-22T00:00:00\", \"assignerOrgId\": \"e24e6442-3ae1-4538-a7b8-7ac95586db8f\", \"datePublished\": \"2024-03-16T00:00:00\", \"assignerShortName\": \"Carrier\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…