CVE-2023-3330 (GCVE-0-2023-3330)
Vulnerability from cvelistv5 – Published: 2023-06-28 01:13 – Updated: 2024-12-04 21:42
VLAI?
Summary
Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to obtain specific files in the product.
Severity ?
No CVSS data available.
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| NEC Corporation | Aterm WG2600HP2 |
Affected:
all versions
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Mr. Taizoh Tsukamoto in Mitsui Bussan Secure Directions, Inc.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:55:00.699Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://jpn.nec.com/security-info/secinfo/nv23-007_en.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-3330",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T20:43:58.758310Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T21:42:54.798Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Aterm WG2600HP2",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WG2600HP",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WG2200HP",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WG2200HP",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WG1800HP2",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WG1800HP",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WG1400HP",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WG600HP",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WG300HP",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WF300HP",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WR9500N",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WR9300N",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WR8750N",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WR8700N",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WR8600N",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WR8370N",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WR8175N",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Aterm WR8170N",
"vendor": "NEC Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Mr. Taizoh Tsukamoto in Mitsui Bussan Secure Directions, Inc."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003ea attacker\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003eto\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;obtain specific files in the product\u003c/span\u003e\u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e.\u003c/span\u003e"
}
],
"value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u00a0a attacker\u00a0to\u00a0obtain specific files in the product."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-28T00:56:00.401Z",
"orgId": "f2760a35-e0d8-4637-ac4c-cc1a2de3e282",
"shortName": "NEC"
},
"references": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv23-007_en.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\nStop using the products or remove the USB storage.\u003cbr\u003e"
}
],
"value": "\nStop using the products or remove the USB storage.\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "f2760a35-e0d8-4637-ac4c-cc1a2de3e282",
"assignerShortName": "NEC",
"cveId": "CVE-2023-3330",
"datePublished": "2023-06-28T01:13:03.181Z",
"dateReserved": "2023-06-20T01:14:05.654Z",
"dateUpdated": "2024-12-04T21:42:54.798Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wf300hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FDEB886-84A3-466F-A44D-C8343DC8EA26\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wf300hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02D5D7A6-3E46-401A-8987-ECCC0D97BE73\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg1400hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D2A5730-11AC-4920-ACC3-B16F3F06F74D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg1400hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B516AF4-E4BE-4074-A8B7-67276C7B57CD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg1800hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C771D26-13FE-4821-8FAE-7B55E147C586\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg1800hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44146A63-6E9A-4A6A-836A-FA75E0954E35\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg1800hp2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9971F7F6-56E0-49D8-8D77-EEE4E0398531\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg1800hp2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7F7EC38-F304-41AD-9F85-39820E5945E6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg2200hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A48CCBD-1662-4188-ADBB-B3E69E2330F6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg2200hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F167B2EE-7708-4A73-A52D-35725A0A1E29\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg2600hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B377AF40-2788-4192-AC90-E6395B62FC4C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg2600hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"872F8DA6-CB06-4886-801D-DC8F53EB7305\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg2600hp2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85717CF6-DB27-4F5F-9685-5235A5EB402B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg2600hp2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49782342-2E93-475A-90A5-9EDF40F97137\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg300hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3736608B-2D6C-4E2B-A52D-D3F1E60C1498\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg300hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"195A8A79-4E27-4EDD-975F-A4B58F040221\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg600hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CC22AB5-2239-45FB-B57E-6344FE3EA483\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg600hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"049F25E4-A0A6-4E98-9FB2-63BF9D451B4A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8600n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"093CFEBE-49F0-4387-B0CD-377F580E37AA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8600n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D96606ED-63AA-41E0-823A-16A2CD5200FD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8700n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FCBF41D-824A-449C-9C1F-5FF3DE9D6F08\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8700n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FD5B8F6-19F6-4F80-90C3-AC4EFE564FFF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8750n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"014F8A96-0AA2-4C65-89F8-2DF59717D079\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8750n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9559B967-CCD6-4CEE-ADD8-862D1D7E5D96\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr9300n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96E88402-955F-4565-8219-1332DBC3FAB5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr9300n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B83D44BD-00FB-4F15-B543-84DF92E67CBD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr9500n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B542A9B-FBE4-446B-9BCF-F86859BB2F16\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr9500n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63C99E37-A070-49C3-BB3B-AE189F02E5F2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8170n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9E46CDB-A7B3-4A2C-8A91-E18986F60AC6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8170n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24F752BB-CFD7-41EC-83FD-7C0A352C72B7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8175n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D29A7303-517C-4FDE-AB97-9AD9D42F1E5F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8175n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"138732B4-C531-4DD3-B2C6-F672E72EE3AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8370n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02434FCD-EBFB-4A93-A0F1-E0FED57715C1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8370n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B487F29B-4F4D-40EB-9D7E-48681370F5F6\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\\u00a0a attacker\\u00a0to\\u00a0obtain specific files in the product.\"}]",
"id": "CVE-2023-3330",
"lastModified": "2024-11-21T08:17:01.777",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}]}",
"published": "2023-06-28T02:15:49.523",
"references": "[{\"url\": \"https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\", \"source\": \"psirt-info@cyber.jp.nec.com\"}, {\"url\": \"https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"psirt-info@cyber.jp.nec.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-3330\",\"sourceIdentifier\":\"psirt-info@cyber.jp.nec.com\",\"published\":\"2023-06-28T02:15:49.523\",\"lastModified\":\"2024-11-21T08:17:01.777\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u00a0a attacker\u00a0to\u00a0obtain specific files in the product.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"psirt-info@cyber.jp.nec.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wf300hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FDEB886-84A3-466F-A44D-C8343DC8EA26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wf300hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D5D7A6-3E46-401A-8987-ECCC0D97BE73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg1400hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D2A5730-11AC-4920-ACC3-B16F3F06F74D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg1400hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B516AF4-E4BE-4074-A8B7-67276C7B57CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg1800hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C771D26-13FE-4821-8FAE-7B55E147C586\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg1800hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44146A63-6E9A-4A6A-836A-FA75E0954E35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg1800hp2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9971F7F6-56E0-49D8-8D77-EEE4E0398531\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg1800hp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F7EC38-F304-41AD-9F85-39820E5945E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg2200hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A48CCBD-1662-4188-ADBB-B3E69E2330F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg2200hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F167B2EE-7708-4A73-A52D-35725A0A1E29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg2600hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B377AF40-2788-4192-AC90-E6395B62FC4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg2600hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"872F8DA6-CB06-4886-801D-DC8F53EB7305\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg2600hp2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85717CF6-DB27-4F5F-9685-5235A5EB402B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg2600hp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49782342-2E93-475A-90A5-9EDF40F97137\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg300hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3736608B-2D6C-4E2B-A52D-D3F1E60C1498\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg300hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"195A8A79-4E27-4EDD-975F-A4B58F040221\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg600hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC22AB5-2239-45FB-B57E-6344FE3EA483\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg600hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"049F25E4-A0A6-4E98-9FB2-63BF9D451B4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8600n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093CFEBE-49F0-4387-B0CD-377F580E37AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8600n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D96606ED-63AA-41E0-823A-16A2CD5200FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8700n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FCBF41D-824A-449C-9C1F-5FF3DE9D6F08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8700n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD5B8F6-19F6-4F80-90C3-AC4EFE564FFF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8750n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"014F8A96-0AA2-4C65-89F8-2DF59717D079\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8750n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9559B967-CCD6-4CEE-ADD8-862D1D7E5D96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr9300n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E88402-955F-4565-8219-1332DBC3FAB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr9300n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B83D44BD-00FB-4F15-B543-84DF92E67CBD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr9500n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B542A9B-FBE4-446B-9BCF-F86859BB2F16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr9500n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63C99E37-A070-49C3-BB3B-AE189F02E5F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8170n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E46CDB-A7B3-4A2C-8A91-E18986F60AC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8170n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24F752BB-CFD7-41EC-83FD-7C0A352C72B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8175n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D29A7303-517C-4FDE-AB97-9AD9D42F1E5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8175n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138732B4-C531-4DD3-B2C6-F672E72EE3AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8370n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02434FCD-EBFB-4A93-A0F1-E0FED57715C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8370n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B487F29B-4F4D-40EB-9D7E-48681370F5F6\"}]}]}],\"references\":[{\"url\":\"https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\",\"source\":\"psirt-info@cyber.jp.nec.com\"},{\"url\":\"https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:55:00.699Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-3330\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-04T20:43:58.758310Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-04T20:44:24.740Z\"}}], \"cna\": {\"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Mr. Taizoh Tsukamoto in Mitsui Bussan Secure Directions, Inc.\"}], \"affected\": [{\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG2600HP2\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG2600HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG2200HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG2200HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG1800HP2\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG1800HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG1400HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG600HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG300HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WF300HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR9500N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR9300N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8750N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8700N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8600N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8370N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8175N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8170N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"\\nStop using the products or remove the USB storage.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\nStop using the products or remove the USB storage.\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\\u00a0a attacker\\u00a0to\\u00a0obtain specific files in the product.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u0026nbsp;\u003cspan style=\\\"background-color: var(--wht);\\\"\u003ea attacker\u0026nbsp;\u003c/span\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003eto\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;obtain specific files in the product\u003c/span\u003e\u003c/span\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003e.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22: Improper Limitation of a Pathname to a Restricted Directory\"}]}], \"providerMetadata\": {\"orgId\": \"f2760a35-e0d8-4637-ac4c-cc1a2de3e282\", \"shortName\": \"NEC\", \"dateUpdated\": \"2023-08-28T00:56:00.401Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-3330\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-04T21:42:54.798Z\", \"dateReserved\": \"2023-06-20T01:14:05.654Z\", \"assignerOrgId\": \"f2760a35-e0d8-4637-ac4c-cc1a2de3e282\", \"datePublished\": \"2023-06-28T01:13:03.181Z\", \"assignerShortName\": \"NEC\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…