FKIE_CVE-2023-42419
Vulnerability from fkie_nvd - Published: 2024-03-05 06:15 - Updated: 2024-11-21 08:22
Severity ?
Summary
Maintenance Server, in Cybellum's QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.
An attacker with administrative privileges & access to the air-gapped server could potentially use this key to run commands on the server.
The issue was resolved in version 2.28.
Earlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Maintenance Server, in\u00a0Cybellum\u0027s\u00a0QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.\n\n\nAn attacker with administrative privileges \u0026 access to the air-gapped server could potentially\u00a0use this key to run commands on the server.\nThe issue was resolved in version 2.28.\nEarlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.\n\n"
},
{
"lang": "es",
"value": "Maintenance Server, en la distribuci\u00f3n aislada QCOW de Cybellum (edici\u00f3n China), versiones 2.15.5 a 2.27, se compil\u00f3 con una clave criptogr\u00e1fica privada codificada. Un atacante con privilegios administrativos y acceso al servidor aislado podr\u00eda usar esta clave para ejecutar comandos en el servidor. El problema se resolvi\u00f3 en la versi\u00f3n 2.28. Las versiones anteriores, incluidas todas las versiones de Cybellum 1.x, y las distribuciones para el resto del mundo no se ver\u00e1n afectadas."
}
],
"id": "CVE-2023-42419",
"lastModified": "2024-11-21T08:22:30.233",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.3,
"impactScore": 3.4,
"source": "info@cybellum.com",
"type": "Secondary"
}
]
},
"published": "2024-03-05T06:15:52.820",
"references": [
{
"source": "info@cybellum.com",
"url": "https://cybellum.com/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://cybellum.com/"
}
],
"sourceIdentifier": "info@cybellum.com",
"vulnStatus": "Awaiting Analysis"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…