WID-SEC-W-2023-2620

Vulnerability from csaf_certbund - Published: 2023-10-10 22:00 - Updated: 2025-04-09 22:00
Summary
Samba: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Samba ist eine Open Source Software Suite, die Druck- und Dateidienste für SMB/CIFS Clients implementiert.
Angriff: Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Samba ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Dateien zu manipulieren oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme: - Linux - UNIX
References
https://wid.cert-bund.de/.well-known/csaf/white/2… self
https://wid.cert-bund.de/portal/wid/securityadvis… self
https://www.samba.org/samba/history/samba-4.19.1.html external
https://www.samba.org/samba/history/samba-4.18.8.html external
https://www.samba.org/samba/history/samba-4.17.12.html external
https://ubuntu.com/security/notices/USN-6425-1 external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://ubuntu.com/security/notices/USN-6425-2 external
https://www.debian.org/security/2023/dsa-5525 external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://www.suse.com/support/update/announcement/… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://ubuntu.com/security/notices/USN-6425-3 external
https://access.redhat.com/errata/RHSA-2023:6209 external
https://access.redhat.com/errata/RHSA-2023:6744 external
https://linux.oracle.com/errata/ELSA-2023-6744.html external
https://access.redhat.com/errata/RHSA-2023:7408 external
https://access.redhat.com/errata/RHSA-2023:7371 external
https://access.redhat.com/errata/RHSA-2023:7464 external
https://access.redhat.com/errata/RHSA-2023:7467 external
https://linux.oracle.com/errata/ELSA-2023-7467.html external
https://alas.aws.amazon.com/AL2/ALAS-2023-2367.html external
https://www.cybersecurity-help.cz/vdb/SB2023120539 external
https://www.qnap.com/de-de/security-advisory/QSA-23-20 external
https://security.gentoo.org/glsa/202402-28 external
https://lists.debian.org/debian-security-announce… external
https://www.ibm.com/support/pages/node/7145367 external
https://www.ibm.com/support/pages/node/7148094 external
https://lists.debian.org/debian-lts-announce/2024… external
https://support.hpe.com/hpesc/public/docDisplay?d… external
https://www.ibm.com/support/pages/node/7230557 external

{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Samba ist eine Open Source Software Suite, die Druck- und Dateidienste f\u00fcr SMB/CIFS Clients implementiert.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Samba ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Dateien zu manipulieren oder vertrauliche Informationen offenzulegen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- UNIX",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-2620 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2620.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-2620 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2620"
      },
      {
        "category": "external",
        "summary": "Samba release notes 4.19.1 vom 2023-10-10",
        "url": "https://www.samba.org/samba/history/samba-4.19.1.html"
      },
      {
        "category": "external",
        "summary": "Samba release notes 4.18.8 vom 2023-10-10",
        "url": "https://www.samba.org/samba/history/samba-4.18.8.html"
      },
      {
        "category": "external",
        "summary": "Samba release notes 4.17.12 vom 2023-10-10",
        "url": "https://www.samba.org/samba/history/samba-4.17.12.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6425-1 vom 2023-10-10",
        "url": "https://ubuntu.com/security/notices/USN-6425-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4040-1 vom 2023-10-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016619.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4046-1 vom 2023-10-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016626.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-99444E494B vom 2023-10-11",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-99444e494b"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6425-2 vom 2023-10-11",
        "url": "https://ubuntu.com/security/notices/USN-6425-2"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5525 vom 2023-10-12",
        "url": "https://www.debian.org/security/2023/dsa-5525"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-FFF0C857D6 vom 2023-10-11",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-fff0c857d6"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-7EB8CBF1A5 vom 2023-10-11",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-7eb8cbf1a5"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4059-1 vom 2023-10-13",
        "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234059-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4096-1 vom 2023-10-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016714.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6425-3 vom 2023-10-17",
        "url": "https://ubuntu.com/security/notices/USN-6425-3"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6209 vom 2023-10-31",
        "url": "https://access.redhat.com/errata/RHSA-2023:6209"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6744 vom 2023-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:6744"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-6744 vom 2023-11-16",
        "url": "https://linux.oracle.com/errata/ELSA-2023-6744.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7408 vom 2023-11-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:7408"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7371 vom 2023-11-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:7371"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7464 vom 2023-11-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:7464"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7467 vom 2023-11-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:7467"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-7467 vom 2023-11-27",
        "url": "https://linux.oracle.com/errata/ELSA-2023-7467.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2023-2367 vom 2023-12-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2367.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2023-1896 vom 2023-12-05",
        "url": "https://www.cybersecurity-help.cz/vdb/SB2023120539"
      },
      {
        "category": "external",
        "summary": "QNAP Security Advisory QSA-23-20 vom 2023-12-08",
        "url": "https://www.qnap.com/de-de/security-advisory/QSA-23-20"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202402-28 vom 2024-02-19",
        "url": "https://security.gentoo.org/glsa/202402-28"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5647 vom 2024-03-24",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00055.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7145367 vom 2024-03-27",
        "url": "https://www.ibm.com/support/pages/node/7145367"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7148094 vom 2024-04-11",
        "url": "https://www.ibm.com/support/pages/node/7148094"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3792 vom 2024-04-22",
        "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin vom 2024-10-25",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04724en_us\u0026docLocale=en_US"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7230557 vom 2025-04-10",
        "url": "https://www.ibm.com/support/pages/node/7230557"
      }
    ],
    "source_lang": "en-US",
    "title": "Samba: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-04-09T22:00:00.000+00:00",
      "generator": {
        "date": "2025-04-10T09:53:00.313+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.12"
        }
      },
      "id": "WID-SEC-W-2023-2620",
      "initial_release_date": "2023-10-10T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-10-10T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-10-11T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Fedora, Ubuntu und Debian aufgenommen"
        },
        {
          "date": "2023-10-12T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2023-10-17T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
        },
        {
          "date": "2023-10-31T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-07T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-16T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-11-21T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-22T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-27T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-12-04T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2023-12-05T23:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2023-12-10T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von QNAP aufgenommen"
        },
        {
          "date": "2024-02-18T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2024-03-24T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-03-27T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-04-11T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-04-22T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-10-27T23:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2025-04-09T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "20"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "(CIFS) Client/Server \u003cB.04.18.01.00",
                "product": {
                  "name": "HPE HP-UX (CIFS) Client/Server \u003cB.04.18.01.00",
                  "product_id": "T038611"
                }
              },
              {
                "category": "product_version",
                "name": "(CIFS) Client/Server B.04.18.01.00",
                "product": {
                  "name": "HPE HP-UX (CIFS) Client/Server B.04.18.01.00",
                  "product_id": "T038611-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:hp:hp-ux:%28cifs%29_clientserver__b.04.18.01.00"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "HP-UX"
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.5",
                "product": {
                  "name": "IBM QRadar SIEM 7.5",
                  "product_id": "T022954",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP8",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP8",
                  "product_id": "T033681"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP8",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP8",
                  "product_id": "T033681-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up8"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c10.1.17",
                "product": {
                  "name": "IBM Spectrum Protect Plus \u003c10.1.17",
                  "product_id": "T042730"
                }
              },
              {
                "category": "product_version",
                "name": "10.1.17",
                "product": {
                  "name": "IBM Spectrum Protect Plus 10.1.17",
                  "product_id": "T042730-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Spectrum Protect Plus"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c4.19.1",
                "product": {
                  "name": "Open Source Samba \u003c4.19.1",
                  "product_id": "T030418"
                }
              },
              {
                "category": "product_version",
                "name": "4.19.1",
                "product": {
                  "name": "Open Source Samba 4.19.1",
                  "product_id": "T030418-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:samba:samba:4.19.1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c4.18.8",
                "product": {
                  "name": "Open Source Samba \u003c4.18.8",
                  "product_id": "T030419"
                }
              },
              {
                "category": "product_version",
                "name": "4.18.8",
                "product": {
                  "name": "Open Source Samba 4.18.8",
                  "product_id": "T030419-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:samba:samba:4.18.8"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c4.17.12",
                "product": {
                  "name": "Open Source Samba \u003c4.17.12",
                  "product_id": "T030420"
                }
              },
              {
                "category": "product_version",
                "name": "4.17.12",
                "product": {
                  "name": "Open Source Samba 4.17.12",
                  "product_id": "T030420-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:samba:samba:4.17.12"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Samba"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "QNAP NAS",
            "product": {
              "name": "QNAP NAS",
              "product_id": "T017100",
              "product_identification_helper": {
                "cpe": "cpe:/h:qnap:nas:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "QNAP"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-3961",
      "product_status": {
        "known_affected": [
          "T030420",
          "67646",
          "T038611",
          "T033681",
          "T012167",
          "T004914",
          "74185",
          "T017100",
          "T022954",
          "T042730",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T030419",
          "T030418"
        ]
      },
      "release_date": "2023-10-10T22:00:00.000+00:00",
      "title": "CVE-2023-3961"
    },
    {
      "cve": "CVE-2023-4091",
      "product_status": {
        "known_affected": [
          "T030420",
          "67646",
          "T038611",
          "T033681",
          "T012167",
          "T004914",
          "74185",
          "T017100",
          "T022954",
          "T042730",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T030419",
          "T030418"
        ]
      },
      "release_date": "2023-10-10T22:00:00.000+00:00",
      "title": "CVE-2023-4091"
    },
    {
      "cve": "CVE-2023-4154",
      "product_status": {
        "known_affected": [
          "T030420",
          "67646",
          "T038611",
          "T033681",
          "T012167",
          "T004914",
          "74185",
          "T017100",
          "T022954",
          "T042730",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T030419",
          "T030418"
        ]
      },
      "release_date": "2023-10-10T22:00:00.000+00:00",
      "title": "CVE-2023-4154"
    },
    {
      "cve": "CVE-2023-42669",
      "product_status": {
        "known_affected": [
          "T030420",
          "67646",
          "T038611",
          "T033681",
          "T012167",
          "T004914",
          "74185",
          "T017100",
          "T022954",
          "T042730",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T030419",
          "T030418"
        ]
      },
      "release_date": "2023-10-10T22:00:00.000+00:00",
      "title": "CVE-2023-42669"
    },
    {
      "cve": "CVE-2023-42670",
      "product_status": {
        "known_affected": [
          "T030420",
          "67646",
          "T038611",
          "T033681",
          "T012167",
          "T004914",
          "74185",
          "T017100",
          "T022954",
          "T042730",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T030419",
          "T030418"
        ]
      },
      "release_date": "2023-10-10T22:00:00.000+00:00",
      "title": "CVE-2023-42670"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…