Lucene search

K
cveSELCVE-2023-2264
HistoryNov 30, 2023 - 5:15 p.m.

CVE-2023-2264

2023-11-3017:15:07
CWE-20
SEL
web.nvd.nist.gov
13
cve-2023-2264
schweitzer engineering laboratories
sel-411l
input validation
vulnerability
unauthorized access
nvd

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0

Percentile

9.0%

An improper input validation vulnerability in the Schweitzer Engineering Laboratories SEL-411L could allow a malicious actor to manipulate authorized users to click on a link that could allow undesired behavior.

See product Instruction Manual Appendix A dated 20230830 for more details.

Affected configurations

Nvd
Node
selincsel-411lMatch-
AND
selincsel-411l_firmwareRanger118-v0r118-v4
OR
selincsel-411l_firmwareRanger119-v0r119-v5
OR
selincsel-411l_firmwareRanger120-v0r120-v6
OR
selincsel-411l_firmwareRanger121-v0r121-v3
OR
selincsel-411l_firmwareRanger122-v0r122-v3
OR
selincsel-411l_firmwareRanger123-v0r123-v3
OR
selincsel-411l_firmwareRanger124-v0r124-v3
OR
selincsel-411l_firmwareRanger125-v0r125-v3
OR
selincsel-411l_firmwareRanger126-v0r126-v4
OR
selincsel-411l_firmwareRanger127-v0r127-v2
OR
selincsel-411l_firmwareMatchr128-v0
OR
selincsel-411l_firmwareMatchr129-v0
VendorProductVersionCPE
selincsel-411l-cpe:2.3:h:selinc:sel-411l:-:*:*:*:*:*:*:*
selincsel-411l_firmware*cpe:2.3:o:selinc:sel-411l_firmware:*:*:*:*:*:*:*:*
selincsel-411l_firmwarer128-v0cpe:2.3:o:selinc:sel-411l_firmware:r128-v0:*:*:*:*:*:*:*
selincsel-411l_firmwarer129-v0cpe:2.3:o:selinc:sel-411l_firmware:r129-v0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SEL-411L",
    "vendor": "Schweitzer Engineering Laboratories",
    "versions": [
      {
        "lessThan": "R118-V4",
        "status": "affected",
        "version": "R118-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R119-V5",
        "status": "affected",
        "version": "R119-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R120-V6",
        "status": "affected",
        "version": "R120-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R121-V3",
        "status": "affected",
        "version": "R121-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R122-V3",
        "status": "affected",
        "version": "R122-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R123-V3",
        "status": "affected",
        "version": "R123-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R124-V3",
        "status": "affected",
        "version": "R124-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R125-V3",
        "status": "affected",
        "version": "R125-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R126-V4",
        "status": "affected",
        "version": "R126-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R127-V2",
        "status": "affected",
        "version": "R127-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R128-V1",
        "status": "affected",
        "version": "R128-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R129-V1",
        "status": "affected",
        "version": "R129-V0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVE-2023-2264