CVE-2023-3331 (GCVE-0-2023-3331)

Vulnerability from cvelistv5 – Published: 2023-06-28 01:19 – Updated: 2024-12-04 20:49
VLAI?
Summary
Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to delete specific files in the product.
Severity ?
No CVSS data available.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory
Assigner
NEC
Impacted products
Vendor Product Version
NEC Corporation Aterm WG2600HP2 Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WG2600HP Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WG2200HP Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WG2200HP Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WG1800HP2 Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WG1800HP Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WG1400HP Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WG600HP Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WG300HP Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WF300HP Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WR9500N Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WR9300N Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WR8750N Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WR8700N Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WR8600N Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WR8370N Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WR8175N Affected: all versions
Create a notification for this product.
    NEC Corporation Aterm WR8170N Affected: all versions
Create a notification for this product.
Credits
Mr. Taizoh Tsukamoto in Mitsui Bussan Secure Directions, Inc.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:55:02.734Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-3331",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T20:47:49.905817Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T20:49:51.994Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Aterm WG2600HP2",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WG2600HP",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WG2200HP",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WG2200HP",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WG1800HP2",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WG1800HP",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WG1400HP",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WG600HP",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WG300HP",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WF300HP",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WR9500N",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WR9300N",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WR8750N",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WR8700N",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WR8600N",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WR8370N",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WR8175N",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Aterm WR8170N",
          "vendor": "NEC Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Mr. Taizoh Tsukamoto in Mitsui Bussan Secure Directions, Inc."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003ea attacker\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003eto\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003edelete\u003c/span\u003e\n\n specific files in the product\u003c/span\u003e\u003c/span\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e.\u003c/span\u003e"
            }
          ],
          "value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u00a0a attacker\u00a0to\u00a0delete\n\n specific files in the product."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-03T02:10:13.150Z",
        "orgId": "f2760a35-e0d8-4637-ac4c-cc1a2de3e282",
        "shortName": "NEC"
      },
      "references": [
        {
          "url": "https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nStop using the products or remove the USB storage.\u003cbr\u003e"
            }
          ],
          "value": "\nStop using the products or remove the USB storage.\n"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f2760a35-e0d8-4637-ac4c-cc1a2de3e282",
    "assignerShortName": "NEC",
    "cveId": "CVE-2023-3331",
    "datePublished": "2023-06-28T01:19:45.378Z",
    "dateReserved": "2023-06-20T01:14:08.079Z",
    "dateUpdated": "2024-12-04T20:49:51.994Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wf300hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FDEB886-84A3-466F-A44D-C8343DC8EA26\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wf300hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02D5D7A6-3E46-401A-8987-ECCC0D97BE73\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg1400hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D2A5730-11AC-4920-ACC3-B16F3F06F74D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg1400hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B516AF4-E4BE-4074-A8B7-67276C7B57CD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg1800hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C771D26-13FE-4821-8FAE-7B55E147C586\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg1800hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44146A63-6E9A-4A6A-836A-FA75E0954E35\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg1800hp2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9971F7F6-56E0-49D8-8D77-EEE4E0398531\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg1800hp2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7F7EC38-F304-41AD-9F85-39820E5945E6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg2200hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A48CCBD-1662-4188-ADBB-B3E69E2330F6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg2200hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F167B2EE-7708-4A73-A52D-35725A0A1E29\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg2600hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B377AF40-2788-4192-AC90-E6395B62FC4C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg2600hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"872F8DA6-CB06-4886-801D-DC8F53EB7305\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg2600hp2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85717CF6-DB27-4F5F-9685-5235A5EB402B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg2600hp2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49782342-2E93-475A-90A5-9EDF40F97137\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg300hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3736608B-2D6C-4E2B-A52D-D3F1E60C1498\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg300hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"195A8A79-4E27-4EDD-975F-A4B58F040221\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wg600hp_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CC22AB5-2239-45FB-B57E-6344FE3EA483\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wg600hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"049F25E4-A0A6-4E98-9FB2-63BF9D451B4A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8600n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"093CFEBE-49F0-4387-B0CD-377F580E37AA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8600n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D96606ED-63AA-41E0-823A-16A2CD5200FD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8700n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FCBF41D-824A-449C-9C1F-5FF3DE9D6F08\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8700n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FD5B8F6-19F6-4F80-90C3-AC4EFE564FFF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8750n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"014F8A96-0AA2-4C65-89F8-2DF59717D079\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8750n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9559B967-CCD6-4CEE-ADD8-862D1D7E5D96\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr9300n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96E88402-955F-4565-8219-1332DBC3FAB5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr9300n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B83D44BD-00FB-4F15-B543-84DF92E67CBD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr9500n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B542A9B-FBE4-446B-9BCF-F86859BB2F16\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr9500n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63C99E37-A070-49C3-BB3B-AE189F02E5F2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8170n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9E46CDB-A7B3-4A2C-8A91-E18986F60AC6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8170n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24F752BB-CFD7-41EC-83FD-7C0A352C72B7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8175n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D29A7303-517C-4FDE-AB97-9AD9D42F1E5F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8175n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"138732B4-C531-4DD3-B2C6-F672E72EE3AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nec:aterm_wr8370n_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02434FCD-EBFB-4A93-A0F1-E0FED57715C1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nec:aterm_wr8370n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B487F29B-4F4D-40EB-9D7E-48681370F5F6\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\\u00a0a attacker\\u00a0to\\u00a0delete\\n\\n specific files in the product.\"}]",
      "id": "CVE-2023-3331",
      "lastModified": "2024-11-21T08:17:01.943",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}]}",
      "published": "2023-06-28T02:15:49.590",
      "references": "[{\"url\": \"https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\", \"source\": \"psirt-info@cyber.jp.nec.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt-info@cyber.jp.nec.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"psirt-info@cyber.jp.nec.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-3331\",\"sourceIdentifier\":\"psirt-info@cyber.jp.nec.com\",\"published\":\"2023-06-28T02:15:49.590\",\"lastModified\":\"2024-11-21T08:17:01.943\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u00a0a attacker\u00a0to\u00a0delete\\n\\n specific files in the product.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"psirt-info@cyber.jp.nec.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wf300hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FDEB886-84A3-466F-A44D-C8343DC8EA26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wf300hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D5D7A6-3E46-401A-8987-ECCC0D97BE73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg1400hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D2A5730-11AC-4920-ACC3-B16F3F06F74D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg1400hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B516AF4-E4BE-4074-A8B7-67276C7B57CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg1800hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C771D26-13FE-4821-8FAE-7B55E147C586\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg1800hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44146A63-6E9A-4A6A-836A-FA75E0954E35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg1800hp2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9971F7F6-56E0-49D8-8D77-EEE4E0398531\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg1800hp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F7EC38-F304-41AD-9F85-39820E5945E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg2200hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A48CCBD-1662-4188-ADBB-B3E69E2330F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg2200hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F167B2EE-7708-4A73-A52D-35725A0A1E29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg2600hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B377AF40-2788-4192-AC90-E6395B62FC4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg2600hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"872F8DA6-CB06-4886-801D-DC8F53EB7305\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg2600hp2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85717CF6-DB27-4F5F-9685-5235A5EB402B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg2600hp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49782342-2E93-475A-90A5-9EDF40F97137\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg300hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3736608B-2D6C-4E2B-A52D-D3F1E60C1498\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg300hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"195A8A79-4E27-4EDD-975F-A4B58F040221\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wg600hp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC22AB5-2239-45FB-B57E-6344FE3EA483\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wg600hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"049F25E4-A0A6-4E98-9FB2-63BF9D451B4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8600n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093CFEBE-49F0-4387-B0CD-377F580E37AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8600n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D96606ED-63AA-41E0-823A-16A2CD5200FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8700n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FCBF41D-824A-449C-9C1F-5FF3DE9D6F08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8700n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD5B8F6-19F6-4F80-90C3-AC4EFE564FFF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8750n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"014F8A96-0AA2-4C65-89F8-2DF59717D079\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8750n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9559B967-CCD6-4CEE-ADD8-862D1D7E5D96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr9300n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E88402-955F-4565-8219-1332DBC3FAB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr9300n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B83D44BD-00FB-4F15-B543-84DF92E67CBD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr9500n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B542A9B-FBE4-446B-9BCF-F86859BB2F16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr9500n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63C99E37-A070-49C3-BB3B-AE189F02E5F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8170n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E46CDB-A7B3-4A2C-8A91-E18986F60AC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8170n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24F752BB-CFD7-41EC-83FD-7C0A352C72B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8175n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D29A7303-517C-4FDE-AB97-9AD9D42F1E5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8175n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138732B4-C531-4DD3-B2C6-F672E72EE3AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nec:aterm_wr8370n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02434FCD-EBFB-4A93-A0F1-E0FED57715C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nec:aterm_wr8370n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B487F29B-4F4D-40EB-9D7E-48681370F5F6\"}]}]}],\"references\":[{\"url\":\"https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\",\"source\":\"psirt-info@cyber.jp.nec.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:55:02.734Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-3331\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-04T20:47:49.905817Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-04T20:49:12.994Z\"}}], \"cna\": {\"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Mr. Taizoh Tsukamoto in Mitsui Bussan Secure Directions, Inc.\"}], \"affected\": [{\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG2600HP2\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG2600HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG2200HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG2200HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG1800HP2\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG1800HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG1400HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG600HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WG300HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WF300HP\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR9500N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR9300N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8750N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8700N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8600N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8370N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8175N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"NEC Corporation\", \"product\": \"Aterm WR8170N\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"\\nStop using the products or remove the USB storage.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\nStop using the products or remove the USB storage.\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\\u00a0a attacker\\u00a0to\\u00a0delete\\n\\n specific files in the product.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows\u0026nbsp;\u003cspan style=\\\"background-color: var(--wht);\\\"\u003ea attacker\u0026nbsp;\u003c/span\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003eto\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003edelete\u003c/span\u003e\\n\\n specific files in the product\u003c/span\u003e\u003c/span\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003e.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22: Improper Limitation of a Pathname to a Restricted Directory\"}]}], \"providerMetadata\": {\"orgId\": \"f2760a35-e0d8-4637-ac4c-cc1a2de3e282\", \"shortName\": \"NEC\", \"dateUpdated\": \"2023-07-03T02:10:13.150Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-3331\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-04T20:49:51.994Z\", \"dateReserved\": \"2023-06-20T01:14:08.079Z\", \"assignerOrgId\": \"f2760a35-e0d8-4637-ac4c-cc1a2de3e282\", \"datePublished\": \"2023-06-28T01:19:45.378Z\", \"assignerShortName\": \"NEC\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…