SATO CL4NX-J Plus 1.13.2-u455_r2 WebConfig ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu SATO CL4NX-J Plus 1.13.2-u455_r2 keessatti argameera. Miidhaan irra gahe is hojii hin beekamne kutaa WebConfig keessa. Dhugumatti jijjiirraa gara ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-287 si geessa. Beekumsi kun yeroo 10/01/2023 ifoomsifameera. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2023-5326 jedhuun tajaajilama. Weerara kana milkeessuuf, qunnamtii networkii naannoo barbaachisa. Odeeffannoon teeknikaa hin jiru. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Firewall ugguramaa hojiirra oolchuu akka ta'e ni gorfama. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

3 ଆଡାପ୍ଟେସନ୍ · 71 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
10/01/2023 02:15 PM
ଅଦ୍ୟତନ 1/2
10/23/2023 08:12 AM
ଅଦ୍ୟତନ 2/2
10/23/2023 08:14 AM
software_vendorSATOSATOSATO
software_nameCL4NX-J PlusCL4NX-J PlusCL4NX-J Plus
software_version1.13.2-u455_r21.13.2-u455_r21.13.2-u455_r2
software_componentWebConfigWebConfigWebConfig
vulnerability_cweCWE-287 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)CWE-287 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)CWE-287 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)
vulnerability_risk222
cvss3_vuldb_avAAA
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rlWWW
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus/README.mdhttps://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus/README.mdhttps://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus/README.md
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus/README.mdhttps://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus/README.mdhttps://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus/README.md
countermeasure_nameFirewallFirewallFirewall
source_cveCVE-2023-5326CVE-2023-5326CVE-2023-5326
cna_responsibleVulDBVulDBVulDB
advisory_date1696111200 (10/01/2023)1696111200 (10/01/2023)1696111200 (10/01/2023)
cvss2_vuldb_avAAA
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_rlWWW
cvss2_vuldb_basescore5.85.85.8
cvss2_vuldb_tempscore4.74.74.7
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore5.65.65.6
cvss3_meta_basescore6.36.37.1
cvss3_meta_tempscore5.65.66.9
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1696111200 (10/01/2023)1696111200 (10/01/2023)
cve_nvd_summaryA vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027.A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027.
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avA
cvss2_nvd_acL
cvss2_nvd_auN
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avA
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore5.8
cvss3_nvd_basescore8.8
cvss3_cna_basescore6.3
cvss3_nvd_avA
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH

Want to stay up to date on a daily basis?

Enable the mail alert feature now!