FKIE_CVE-2023-40725
Vulnerability from fkie_nvd - Published: 2023-09-12 10:15 - Updated: 2024-11-21 08:20
Severity ?
Summary
A vulnerability has been identified in QMS Automotive (All versions < V12.39). The affected application returns inconsistent error messages in response to invalid user credentials during login session. This allows an attacker to enumerate usernames, and identify valid usernames.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | qms_automotive | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17162BBB-9C4B-4347-B2F6-F8E40D67C954",
"versionEndExcluding": "12.39",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in QMS Automotive (All versions \u003c V12.39). The affected application returns inconsistent error messages in response to invalid user credentials during login session. This allows an attacker to enumerate usernames, and identify valid usernames."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en QMS Automotive (Todas las versiones \u0026lt; V12.39). La aplicaci\u00f3n afectada devuelve mensajes de error inconsistentes en respuesta a credenciales de usuario no v\u00e1lidas durante la sesi\u00f3n de inicio de sesi\u00f3n. Esto permite a un atacante enumerar nombres de usuario e identificar nombres de usuario v\u00e1lidos."
}
],
"id": "CVE-2023-40725",
"lastModified": "2024-11-21T08:20:02.053",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4,
"source": "productcert@siemens.com",
"type": "Primary"
}
]
},
"published": "2023-09-12T10:15:28.917",
"references": [
{
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf"
}
],
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-209"
}
],
"source": "productcert@siemens.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…