Lucene search

K
cve[email protected]CVE-2023-22319
HistoryJul 06, 2023 - 3:15 p.m.

CVE-2023-22319

2023-07-0615:15:10
CWE-89
web.nvd.nist.gov
11
cybersecurity
vulnerability
sql injection
milesight vpn
authentication bypass
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.9%

A sql injection vulnerability exists in the requestHandlers.js LoginAuth functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An attacker can send a malicious packet to trigger this vulnerability.

Affected configurations

Vulners
NVD
Node
milesightmilesightvpnRangev2.0.2
VendorProductVersionCPE
milesightmilesightvpn*cpe:2.3:a:milesight:milesightvpn:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Milesight",
    "product": "MilesightVPN",
    "versions": [
      {
        "version": "v2.0.2",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.9%

Related for CVE-2023-22319