Lucene search

K
cveSELCVE-2023-34388
HistoryNov 30, 2023 - 5:15 p.m.

CVE-2023-34388

2023-11-3017:15:09
CWE-287
SEL
web.nvd.nist.gov
16
cve-2023-34388
improper authentication
schweitzer engineering laboratories sel-451
remote attack
session hijacking
authentication bypass

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.001

Percentile

50.9%

AnΒ Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication.

See product Instruction Manual Appendix A dated 20230830 for more details.

Affected configurations

Nvd
Node
selincsel-451_firmwareRanger315-v0–r315-v4
OR
selincsel-451_firmwareRanger316-v0–r316-v4
OR
selincsel-451_firmwareRanger317-v0–r317-v4
OR
selincsel-451_firmwareRanger318-v0–r318-v5
OR
selincsel-451_firmwareRanger320-v0–r320-v3
OR
selincsel-451_firmwareRanger321-v0–r321-v3
OR
selincsel-451_firmwareRanger322-v0–r322-v3
OR
selincsel-451_firmwareRanger323-v0–r323-v5
OR
selincsel-451_firmwareRanger324-v0–r324-v4
OR
selincsel-451_firmwareRanger325-v0–r325-v3
OR
selincsel-451_firmwareMatchr326-v0
OR
selincsel-451_firmwareMatchr327-v0
AND
selincsel-451Match-
VendorProductVersionCPE
selincsel-451_firmware*cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*
selincsel-451_firmwarer326-v0cpe:2.3:o:selinc:sel-451_firmware:r326-v0:*:*:*:*:*:*:*
selincsel-451_firmwarer327-v0cpe:2.3:o:selinc:sel-451_firmware:r327-v0:*:*:*:*:*:*:*
selincsel-451-cpe:2.3:h:selinc:sel-451:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SEL-451",
    "vendor": "Schweitzer Engineering Laboratories",
    "versions": [
      {
        "lessThan": "R315-V4",
        "status": "affected",
        "version": "R315-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R316-V4",
        "status": "affected",
        "version": "R316-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R317-V4",
        "status": "affected",
        "version": "R317-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R318-V5",
        "status": "affected",
        "version": "R318-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R320-V3",
        "status": "affected",
        "version": "R320-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R321-V3",
        "status": "affected",
        "version": "R321-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R322-V3",
        "status": "affected",
        "version": "R322-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R323-V5",
        "status": "affected",
        "version": "R323-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R324-V4",
        "status": "affected",
        "version": "R324-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R325-V3",
        "status": "affected",
        "version": "R325-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R326-V1",
        "status": "affected",
        "version": "R326-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R327-V1",
        "status": "affected",
        "version": "R327-V0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.001

Percentile

50.9%

Related for CVE-2023-34388