CVE-2023-42419 (GCVE-0-2023-42419)
Vulnerability from cvelistv5 – Published: 2024-03-05 05:23 – Updated: 2024-08-02 19:16
VLAI?
Summary
Maintenance Server, in Cybellum's QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.
An attacker with administrative privileges & access to the air-gapped server could potentially use this key to run commands on the server.
The issue was resolved in version 2.28.
Earlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.
Severity ?
CWE
- cwe-321 Use of Hard-coded Cryptographic Key
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cybellum | Maintenance Server |
Affected:
2.15.5 , ≤ 2.27
(custom)
Unaffected: 1.* Unaffected: 2.0 , ≤ 2.19 (custom) Unaffected: 2.28 , ≤ or above (custom) |
Credits
Delikely
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42419",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-06T20:33:08.554990Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:25:27.420Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:51.043Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cybellum.com/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"qcow"
],
"product": "Maintenance Server",
"vendor": "Cybellum",
"versions": [
{
"lessThanOrEqual": "2.27",
"status": "affected",
"version": "2.15.5",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "1.*"
},
{
"lessThanOrEqual": "2.19",
"status": "unaffected",
"version": "2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "or above",
"status": "unaffected",
"version": "2.28",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Delikely"
}
],
"datePublic": "2024-02-21T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMaintenance Server, in\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCybellum\u0027s\u0026nbsp;\u003c/span\u003eQCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\u003c/span\u003e\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker with administrative privileges \u0026amp; access to the air-gapped server could potentially\u0026nbsp;use this key to run commands on the server.\u003c/span\u003e\u003cbr\u003eThe issue was resolved in version 2.28.\u003cbr\u003eEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\u003c/span\u003e\n\n"
}
],
"value": "Maintenance Server, in\u00a0Cybellum\u0027s\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\n\n\nAn attacker with administrative privileges \u0026 access to the air-gapped server could potentially\u00a0use this key to run commands on the server.\nThe issue was resolved in version 2.28.\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "The vulnerability exploitation is limited by the need for administrative access \u0026 connection to internal air-gapped networks, reducing its potential impact"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "cwe-321 Use of Hard-coded Cryptographic Key",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-05T05:23:26.720Z",
"orgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"shortName": "Cybellum"
},
"references": [
{
"url": "https://cybellum.com/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCybellum\u0027s \u003c/span\u003eQCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -\u0026gt; Upgrade to version 2.28 or above\u003cbr\u003eAll other versions/distributions -\u0026gt; Unaffected"
}
],
"value": "\n\n\n\n\nCybellum\u0027s QCOW air-gapped distribution (China Edition), versions \n\n2.15.5\n\n through 2.27 -\u003e Upgrade to version 2.28 or above\nAll other versions/distributions -\u003e Unaffected"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Improper Management of Cryptographic Keys in the Maintenance Server in QCOW Air-Gapped Distribution (China Edition)",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "24e70c8d-eeca-431d-8285-199a41b4014e",
"assignerShortName": "Cybellum",
"cveId": "CVE-2023-42419",
"datePublished": "2024-03-05T05:23:16.947Z",
"dateReserved": "2023-09-08T04:33:08.334Z",
"dateUpdated": "2024-08-02T19:16:51.043Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Maintenance Server, in\\u00a0Cybellum\u0027s\\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\\n\\n\\nAn attacker with administrative privileges \u0026 access to the air-gapped server could potentially\\u00a0use this key to run commands on the server.\\nThe issue was resolved in version 2.28.\\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Maintenance Server, en la distribuci\\u00f3n aislada QCOW de Cybellum (edici\\u00f3n China), versiones 2.15.5 a 2.27, se compil\\u00f3 con una clave criptogr\\u00e1fica privada codificada. Un atacante con privilegios administrativos y acceso al servidor aislado podr\\u00eda usar esta clave para ejecutar comandos en el servidor. El problema se resolvi\\u00f3 en la versi\\u00f3n 2.28. Las versiones anteriores, incluidas todas las versiones de Cybellum 1.x, y las distribuciones para el resto del mundo no se ver\\u00e1n afectadas.\"}]",
"id": "CVE-2023-42419",
"lastModified": "2024-11-21T08:22:30.233",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"info@cybellum.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L\", \"baseScore\": 3.8, \"baseSeverity\": \"LOW\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 0.3, \"impactScore\": 3.4}]}",
"published": "2024-03-05T06:15:52.820",
"references": "[{\"url\": \"https://cybellum.com/\", \"source\": \"info@cybellum.com\"}, {\"url\": \"https://cybellum.com/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "info@cybellum.com",
"vulnStatus": "Awaiting Analysis"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-42419\",\"sourceIdentifier\":\"info@cybellum.com\",\"published\":\"2024-03-05T06:15:52.820\",\"lastModified\":\"2024-11-21T08:22:30.233\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Maintenance Server, in\u00a0Cybellum\u0027s\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\\n\\n\\nAn attacker with administrative privileges \u0026 access to the air-gapped server could potentially\u00a0use this key to run commands on the server.\\nThe issue was resolved in version 2.28.\\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Maintenance Server, en la distribuci\u00f3n aislada QCOW de Cybellum (edici\u00f3n China), versiones 2.15.5 a 2.27, se compil\u00f3 con una clave criptogr\u00e1fica privada codificada. Un atacante con privilegios administrativos y acceso al servidor aislado podr\u00eda usar esta clave para ejecutar comandos en el servidor. El problema se resolvi\u00f3 en la versi\u00f3n 2.28. Las versiones anteriores, incluidas todas las versiones de Cybellum 1.x, y las distribuciones para el resto del mundo no se ver\u00e1n afectadas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cybellum.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L\",\"baseScore\":3.8,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":0.3,\"impactScore\":3.4}]},\"references\":[{\"url\":\"https://cybellum.com/\",\"source\":\"info@cybellum.com\"},{\"url\":\"https://cybellum.com/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"platforms\": [\"qcow\"], \"product\": \"Maintenance Server\", \"vendor\": \"Cybellum\", \"versions\": [{\"lessThanOrEqual\": \"2.27\", \"status\": \"affected\", \"version\": \"2.15.5\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"1.*\"}, {\"lessThanOrEqual\": \"2.19\", \"status\": \"unaffected\", \"version\": \"2.0\", \"versionType\": \"custom\"}, {\"lessThanOrEqual\": \"or above\", \"status\": \"unaffected\", \"version\": \"2.28\", \"versionType\": \"custom\"}]}], \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Delikely\"}], \"datePublic\": \"2024-02-21T18:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eMaintenance Server, in\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eCybellum\u0027s\u0026nbsp;\u003c/span\u003eQCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\u003c/span\u003e\u003cbr\u003e\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAn attacker with administrative privileges \u0026amp; access to the air-gapped server could potentially\u0026nbsp;use this key to run commands on the server.\u003c/span\u003e\u003cbr\u003eThe issue was resolved in version 2.28.\u003cbr\u003eEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\u003c/span\u003e\\n\\n\"}], \"value\": \"Maintenance Server, in\\u00a0Cybellum\u0027s\\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\\n\\n\\nAn attacker with administrative privileges \u0026 access to the air-gapped server could potentially\\u00a0use this key to run commands on the server.\\nThe issue was resolved in version 2.28.\\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\\n\\n\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"availabilityImpact\": \"LOW\", \"baseScore\": 3.8, \"baseSeverity\": \"LOW\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"The vulnerability exploitation is limited by the need for administrative access \u0026 connection to internal air-gapped networks, reducing its potential impact\"}]}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"cwe-321 Use of Hard-coded Cryptographic Key\", \"lang\": \"en\"}]}], \"providerMetadata\": {\"orgId\": \"24e70c8d-eeca-431d-8285-199a41b4014e\", \"shortName\": \"Cybellum\", \"dateUpdated\": \"2024-03-05T05:23:26.720Z\"}, \"references\": [{\"url\": \"https://cybellum.com/\"}], \"solutions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\\n\\n\\n\\n\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eCybellum\u0027s \u003c/span\u003eQCOW air-gapped distribution (China Edition), versions \\n\\n2.15.5\\n\\n through 2.27 -\u0026gt; Upgrade to version 2.28 or above\u003cbr\u003eAll other versions/distributions -\u0026gt; Unaffected\"}], \"value\": \"\\n\\n\\n\\n\\nCybellum\u0027s QCOW air-gapped distribution (China Edition), versions \\n\\n2.15.5\\n\\n through 2.27 -\u003e Upgrade to version 2.28 or above\\nAll other versions/distributions -\u003e Unaffected\"}], \"source\": {\"discovery\": \"EXTERNAL\"}, \"title\": \"Improper Management of Cryptographic Keys in the Maintenance Server in QCOW Air-Gapped Distribution (China Edition)\", \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-42419\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-06T20:33:08.554990Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:16.217Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}",
"cveMetadata": "{\"cveId\": \"CVE-2023-42419\", \"assignerOrgId\": \"24e70c8d-eeca-431d-8285-199a41b4014e\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"Cybellum\", \"dateReserved\": \"2023-09-08T04:33:08.334Z\", \"datePublished\": \"2024-03-05T05:23:16.947Z\", \"dateUpdated\": \"2024-06-04T17:25:27.420Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…