Lucene search

K
cveMitreCVE-2023-28610
HistoryMar 23, 2023 - 4:15 p.m.

CVE-2023-28610

2023-03-2316:15:12
mitre
web.nvd.nist.gov
24
cve-2023-28610
omicron stationguard
omicron stationscout
firmware update
remote attacker
root access

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.003

Percentile

69.2%

The update process in OMICRON StationGuard and OMICRON StationScout before 2.21 can be exploited by providing a modified firmware update image. This allows a remote attacker to gain root access to the system.

Affected configurations

Nvd
Node
omicronenergystationguardRange2.20
OR
omicronenergystationscoutRange2.20
VendorProductVersionCPE
omicronenergystationguard*cpe:2.3:a:omicronenergy:stationguard:*:*:*:*:*:*:*:*
omicronenergystationscout*cpe:2.3:a:omicronenergy:stationscout:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.003

Percentile

69.2%

Related for CVE-2023-28610