gsd-2023-43755
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
** UNSUPPPORTED WHEN ASSIGNED ** Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220, and CD321 IP Cameras with firmware version M2.1.6.05 are vulnerable to multiple instances of stack-based overflows. During the processing and parsing of certain fields in XML elements from incoming network requests, the product does not sufficiently check or validate allocated buffer size. This may lead to remote code execution.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2023-43755",
    "id": "GSD-2023-43755"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-43755"
      ],
      "details": "** UNSUPPPORTED WHEN ASSIGNED ** Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras \n\nwith firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. During the \nprocessing and parsing of certain fields in XML elements from incoming \nnetwork requests, the product does not sufficiently check or validate \nallocated buffer size. This may lead to remote code execution.\n\n",
      "id": "GSD-2023-43755",
      "modified": "2023-12-13T01:20:44.482267Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "ics-cert@hq.dhs.gov",
        "ID": "CVE-2023-43755",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "IP Camera CF7500",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera CF7300",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera CF7201",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera CF7501",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera CB3211",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera CB3212",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera CB5220",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera CB6231",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera B8520",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera B8220",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "IP Camera CD321",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "version M2.1.6.05"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Zavio"
            }
          ]
        }
      },
      "credits": [
        {
          "lang": "en",
          "value": "Attila Szasz "
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "** UNSUPPPORTED WHEN ASSIGNED ** Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras \n\nwith firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. During the \nprocessing and parsing of certain fields in XML elements from incoming \nnetwork requests, the product does not sufficiently check or validate \nallocated buffer size. This may lead to remote code execution.\n\n"
          }
        ]
      },
      "generator": {
        "engine": "Vulnogram 0.1.0-dev"
      },
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-121",
                "lang": "eng",
                "value": "CWE-121 Stack-Based Buffer Overflow"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03",
            "refsource": "MISC",
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
          }
        ]
      },
      "source": {
        "advisory": "ICSA-23-304-03",
        "discovery": "EXTERNAL"
      },
      "work_around": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\n\n\n"
        }
      ]
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cf7500_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D543FC87-52FF-4BC4-BE57-949BB23D88AD",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cf7500:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "30F595D2-3CB4-4444-A01F-CE38CBE2D0DC",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cf7300_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3FA43E48-E3D0-4913-9040-BF11D9E61385",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cf7300:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B008EE1F-5B08-417A-8206-20F1362DB911",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cf7201_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7A6E3CDA-3C8B-4894-A42A-CFC5AA077047",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cf7201:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B5240BE7-31E4-4A40-A480-E744E3CAEA3A",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cf7501_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5CF6549F-9E86-4B45-8B60-BB62BEB72B19",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cf7501:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9285F916-50BE-4E41-8EF3-97D882B54CD6",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cb3211_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3F7DBB50-D334-493F-B661-04C798383D29",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cb3211:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1C32A113-76F5-4EBD-BD15-EFBB17F0942C",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cb3212_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "883549EB-5A5B-437E-8B10-D7C691142B92",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cb3212:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FC86EF14-298F-414E-8558-1D025CDF6057",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cb5220_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C43C9ED3-167E-4424-841E-50A56FF398F0",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cb5220:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AFEC44B0-C2C7-4306-91CA-AA841B23498D",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cb6231_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1E8483A6-426F-4595-8B7F-1FC04E9B31FF",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cb6231:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "766018BD-DD32-420A-9511-D97D9DE46BBA",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:b8520_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "779DE260-60AA-465E-957D-B7502E806863",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:b8520:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F60E1FE1-F2E8-4BF7-A33D-4ED4D72BF360",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:b8220_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "99AC7EEC-C4A5-4F79-9608-D02E29356217",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:b8220:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8623A941-0514-49BD-967D-E347F6F99329",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:zavio:cd321_firmware:m2.1.6.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "35DCACBC-6483-4113-BC77-041BE4D692F9",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:zavio:cd321:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4E906053-BE44-45B4-AD08-D7DFCFD5EDF2",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras \n\nwith firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. During the \nprocessing and parsing of certain fields in XML elements from incoming \nnetwork requests, the product does not sufficiently check or validate \nallocated buffer size. This may lead to remote code execution.\n\n"
          },
          {
            "lang": "es",
            "value": "IP Cameras Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220 y CD321 con versi\u00f3n de firmware M2.1.6.05 son vulnerables a m\u00faltiples instancias de desbordamientos basados en pila. Durante el procesamiento y an\u00e1lisis de ciertos campos en elementos XML de solicitudes de red entrantes, el producto no verifica ni valida suficientemente el tama\u00f1o del b\u00fafer asignado. Esto puede provocar la ejecuci\u00f3n remota de c\u00f3digo."
          }
        ],
        "id": "CVE-2023-43755",
        "lastModified": "2024-04-11T01:21:48.560",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 9.8,
                "baseSeverity": "CRITICAL",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 5.9,
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 9.8,
                "baseSeverity": "CRITICAL",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 5.9,
              "source": "ics-cert@hq.dhs.gov",
              "type": "Secondary"
            }
          ]
        },
        "published": "2023-11-08T23:15:10.727",
        "references": [
          {
            "source": "ics-cert@hq.dhs.gov",
            "tags": [
              "Third Party Advisory",
              "US Government Resource"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
          }
        ],
        "sourceIdentifier": "ics-cert@hq.dhs.gov",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-787"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-121"
              }
            ],
            "source": "ics-cert@hq.dhs.gov",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.