fkie_cve-2023-30655
Vulnerability from fkie_nvd
Published
2023-07-06 03:15
Modified
2024-11-21 08:00
Severity ?
8.5 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation vulnerability in SCEPProfile prior to SMR Jul-2023 Release 1 allows local attackers to launch privileged activities.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", matchCriteriaId: "8D2D0083-0A85-47F7-A42D-2040A3BEC132", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", matchCriteriaId: "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", matchCriteriaId: "D7120696-2440-44EC-B3A4-6FCBB4A60A12", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", matchCriteriaId: "A3658A42-BCA9-4188-8B36-3C6599BBF83C", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", matchCriteriaId: "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", matchCriteriaId: "C26195A5-31BE-4116-8F31-9F25BE57AB52", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", matchCriteriaId: "4C6114C5-C175-45E7-821E-6BA218F923DE", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", matchCriteriaId: "58BA232B-8D39-473A-91D0-D3AC03FDE8FB", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", matchCriteriaId: "25B42CE0-67DE-4611-8D70-DEEC975E32BA", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", matchCriteriaId: "AF2EADA0-5976-4711-A7A5-61594F3E2FEB", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", matchCriteriaId: "6B59145B-5506-477C-8F9C-ABB0CE2CF631", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", matchCriteriaId: "AC082E25-1B7D-473D-A066-1463E6321CD5", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", matchCriteriaId: "655BEA94-9A83-4A56-8DDE-79ADC821C707", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", matchCriteriaId: "B894D0C1-E66E-44B0-8FCA-2EE4290C4173", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", matchCriteriaId: "2B088DE9-31F1-4737-8BC8-CC406F208ACB", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", matchCriteriaId: "899F6BD2-47AF-4ADA-935D-90AB069E9BA4", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", matchCriteriaId: "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", matchCriteriaId: "40A783AA-91E7-426B-8A78-4EBE5D69A602", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", matchCriteriaId: "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", matchCriteriaId: "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", matchCriteriaId: "53968A3C-6E71-42B8-8671-6730D8C85603", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", matchCriteriaId: "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", matchCriteriaId: "6C946853-D56D-457C-A1CB-AD1A5BD56C41", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", matchCriteriaId: "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", matchCriteriaId: "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", matchCriteriaId: "E923AF0F-34BA-40FE-AA20-B01366263B97", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", matchCriteriaId: "16A17CC3-7BA2-497C-835B-907B629A1B05", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", matchCriteriaId: "78B14D1F-C536-4816-A076-B074E41EB0A9", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", matchCriteriaId: "644444DC-1247-45FC-A2B9-223D9ED55AB2", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", matchCriteriaId: "548BCC15-C6D8-4AE7-B167-4DD74382097B", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", matchCriteriaId: "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", matchCriteriaId: "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", matchCriteriaId: "40EB3FC1-D79A-40C7-9E2B-573E20780982", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", matchCriteriaId: "0ABFBBDB-E935-4C54-865A-0E607497DA87", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", matchCriteriaId: "3899E3E7-1284-4223-A258-DA691F5D62FE", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", matchCriteriaId: "ECD961EA-6881-4A14-83DE-C6972F6F681C", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", matchCriteriaId: "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", matchCriteriaId: "13E145E2-CE11-4EE5-9085-B4960FE4F52F", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", matchCriteriaId: "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", matchCriteriaId: "02600CDD-6862-4146-88E8-A2E73B7ED534", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", matchCriteriaId: "35F40D59-034B-44FB-8DCD-D469B50DE7E1", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", matchCriteriaId: "BC3F8572-578B-4D19-9453-1D03DA55EF70", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", matchCriteriaId: "EEABF42E-578E-4689-B80D-B305467AA72D", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", matchCriteriaId: "9137C66C-4966-4C90-ABE9-7E22F7E29BA7", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", matchCriteriaId: "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", matchCriteriaId: "18CD523B-530E-4187-8BFF-729CDAC69282", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", matchCriteriaId: "4C28D3CD-DD34-4334-B03F-794B31A4BF48", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", matchCriteriaId: "5A81C86D-F1FE-4166-8F37-D7170E6B30FE", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", matchCriteriaId: "A3D80783-523A-455E-B1AD-0961086F79E6", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", matchCriteriaId: "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", matchCriteriaId: "B0329C50-B904-480D-8EBB-F2757049FC81", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", matchCriteriaId: "70825981-F895-4BFD-9B6E-92BFF0D67023", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", matchCriteriaId: "299284DA-85AB-4162-B858-E67E5C6C14F7", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", matchCriteriaId: "D98F307E-3B01-4C17-86E5-1C6299919417", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", matchCriteriaId: "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", matchCriteriaId: "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", matchCriteriaId: "5F73D594-178F-4FC8-9F40-0E545E2647B0", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", matchCriteriaId: "3F3EF3F1-4E54-46E3-A308-69656A29FBD2", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", matchCriteriaId: "D2B24866-2B3A-4A1A-8B75-EF7A7541797A", vulnerable: true, }, { criteria: "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", matchCriteriaId: "EBB29F18-A929-432B-B20C-365401E6CA12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation vulnerability in SCEPProfile prior to SMR Jul-2023 Release 1 allows local attackers to launch privileged activities.", }, ], id: "CVE-2023-30655", lastModified: "2024-11-21T08:00:37.020", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 8.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L", version: "3.1", }, exploitabilityScore: 2.5, impactScore: 5.3, source: "mobile.security@samsung.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-07-06T03:15:10.627", references: [ { source: "mobile.security@samsung.com", tags: [ "Vendor Advisory", ], url: "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07", }, ], sourceIdentifier: "mobile.security@samsung.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.