cve-2023-4523
Vulnerability from cvelistv5
Published
2023-09-27 18:08
Modified
2024-08-02 07:31
Severity ?
Summary
Real Time Automation 460 Series Cross-site Scripting
References
ics-cert@hq.dhs.govhttps://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01Third Party Advisory, US Government Resource
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:31:06.157Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "460 Series",
          "vendor": "Real Time Automation",
          "versions": [
            {
              "lessThan": "v8.9.8",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "CISA discovered public proof of concept as authored by Yehia Elghaly."
        }
      ],
      "datePublic": "2023-09-21T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\u003c/span\u003e\n\n"
            }
          ],
          "value": "\nReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-27T18:08:26.220Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eReal Time Automation recommends users download and apply the new version of their product. To update the software, \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003econtact Real Time Automation\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;directly for assistance.\u003c/span\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nReal Time Automation recommends users download and apply the new version of their product. To update the software, contact Real Time Automation\u00a0directly for assistance.\n\n\n"
        }
      ],
      "source": {
        "advisory": "ICSA-23-264-01",
        "discovery": "EXTERNAL"
      },
      "title": "Real Time Automation 460 Series Cross-site Scripting",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2023-4523",
    "datePublished": "2023-09-27T18:08:26.220Z",
    "dateReserved": "2023-08-24T17:52:27.663Z",
    "dateUpdated": "2024-08-02T07:31:06.157Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-4523\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2023-09-27T19:15:12.373\",\"lastModified\":\"2023-09-29T15:39:05.767\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Los productos Real Time Automation Serie 460 con versiones anteriores a la v8.9.8 son vulnerables a Cross-Site Scripting (XSS), lo que podr\u00eda permitir a un atacante ejecutar cualquier referencia de JavaScript desde la cadena URL. Si esto ocurriera, la interfaz HTTP de la puerta de enlace redirigir\u00eda a la p\u00e1gina principal, que es index.htm.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\",\"baseScore\":9.4,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460etcmm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1F8BBC-0375-4EF8-A2B7-06CAE092672E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460mcbms:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B3529A-8801-4703-BC36-224F58E314B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460mcbs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3677DE5-0183-41AB-9A47-AA7413B55948\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460mmbms:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CACBF19-7A0A-4632-985C-44A677454F52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460mmbs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F5B7AC-5BD2-432D-91FE-BACB5DABAFD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rtautomation:460_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.8\",\"matchCriteriaId\":\"C4FDC938-0147-4234-A952-0787C371E2DE\"}]}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.