Lucene search

K
cve[email protected]CVE-2023-25556
HistoryApr 18, 2023 - 6:15 p.m.

CVE-2023-25556

2023-04-1818:15:07
CWE-287
web.nvd.nist.gov
20
2
cve-2023-25556
cwe-287
improper authentication
device compromise
knx installation

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.9%

A CWE-287: Improper Authentication vulnerability exists that could allow a device to be
compromised when a key of less than seven digits is entered and the attacker has access to the
KNX installation.

Affected configurations

NVD
Node
schneider-electricmerten_instabus_tastermodul_1fach_system_mMatch-
AND
schneider-electricmerten_instabus_tastermodul_1fach_system_m_firmwareMatch1.0
Node
schneider-electricmerten_instabus_tastermodul_2fach_system_mMatch-
AND
schneider-electricmerten_instabus_tastermodul_2fach_system_m_firmwareMatch1.0
Node
schneider-electricmerten_tasterschnittstelle_4fach_plusMatch-
AND
schneider-electricmerten_tasterschnittstelle_4fach_plus_firmwareMatch1.0
OR
schneider-electricmerten_tasterschnittstelle_4fach_plus_firmwareMatch1.2
Node
schneider-electricmerten_knx_argus_180\/2\,20m_up_systemMatch-
AND
schneider-electricmerten_knx_argus_180\/2\,20m_up_system_firmwareMatch1.0
Node
schneider-electricmerten_jalousie-\/schaltaktor_reg-k\/8x\/16x\/10_m._hbMatch-
AND
schneider-electricmerten_jalousie-\/schaltaktor_reg-k\/8x\/16x\/10_m._hb_firmwareMatch1.0
Node
schneider-electricmerten_knx_uni-dimmaktor_ll_reg-k\/2x230\/300_wMatch-
AND
schneider-electricmerten_knx_uni-dimmaktor_ll_reg-k\/2x230\/300_w_firmwareMatch1.0
OR
schneider-electricmerten_knx_uni-dimmaktor_ll_reg-k\/2x230\/300_w_firmwareMatch1.1
Node
schneider-electricmerten_knx_schaltakt.2x6a_up_m.2_eing.Match-
AND
schneider-electricmerten_knx_schaltakt.2x6a_up_m.2_eing._firmwareMatch0.1

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Merten INSTABUS Tastermodul 1fach System M 625199",
    "vendor": "Schneider Electric",
    "versions": [
      {
        "status": "affected",
        "version": "Program Version 1.0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Merten INSTABUS Tastermodul 2fach System M 625299",
    "vendor": "Schneider Electric",
    "versions": [
      {
        "status": "affected",
        "version": "Program Version 1.0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Merten Tasterschnittstelle 4fach plus 670804",
    "vendor": "Schneider Electric",
    "versions": [
      {
        "status": "affected",
        "version": "Program Version 1.0"
      },
      {
        "status": "affected",
        "version": "Program Version 1.2"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Merten KNX ARGUS 180/2,20M UP SYSTEM 631725",
    "vendor": "Schneider Electric",
    "versions": [
      {
        "status": "affected",
        "version": "Program Version 1.0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Merten Jalousie-/Schaltaktor REG-K/8x/16x/10 m. HB 649908",
    "vendor": "Schneider Electric",
    "versions": [
      {
        "status": "affected",
        "version": "Program Version 1.0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Merten KNX Uni-Dimmaktor LL REG-K/2x230/300 W MEG6710-0002",
    "vendor": "Schneider Electric",
    "versions": [
      {
        "status": "affected",
        "version": "Program Version 1.0"
      },
      {
        "status": "affected",
        "version": "Program Version 1.1"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Merten KNX Schaltakt.2x6A UP m.2 Eing. MEG6003-0002",
    "vendor": "Schneider Electric",
    "versions": [
      {
        "status": "affected",
        "version": "Program Version 0.1"
      }
    ]
  }
]

Social References

More

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.9%

Related for CVE-2023-25556