Lucene search

K
cveSELCVE-2023-34390
HistoryNov 30, 2023 - 5:15 p.m.

CVE-2023-34390

2023-11-3017:15:09
CWE-20
SEL
web.nvd.nist.gov
13
vulnerability
input validation
sel-451
denial of service

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

29.6%

An input validation vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to create a denial of service against the system and locking out services.

See product Instruction Manual Appendix A dated 20230830 for more details.

Affected configurations

Nvd
Node
selincsel-451_firmwareRanger315-v0r315-v4
OR
selincsel-451_firmwareRanger316-v0r316-v4
OR
selincsel-451_firmwareRanger317-v0r317-v4
OR
selincsel-451_firmwareRanger318-v0r318-v5
OR
selincsel-451_firmwareRanger320-v0r320-v3
OR
selincsel-451_firmwareRanger321-v0r321-v3
OR
selincsel-451_firmwareRanger322-v0r322-v3
OR
selincsel-451_firmwareRanger323-v0r323-v5
OR
selincsel-451_firmwareRanger324-v0r324-v4
OR
selincsel-451_firmwareRanger325-v0r325-v3
OR
selincsel-451_firmwareMatchr326-v0
OR
selincsel-451_firmwareMatchr327-v0
AND
selincsel-451Match-
VendorProductVersionCPE
selincsel-451_firmware*cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*
selincsel-451_firmwarer326-v0cpe:2.3:o:selinc:sel-451_firmware:r326-v0:*:*:*:*:*:*:*
selincsel-451_firmwarer327-v0cpe:2.3:o:selinc:sel-451_firmware:r327-v0:*:*:*:*:*:*:*
selincsel-451-cpe:2.3:h:selinc:sel-451:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SEL-451",
    "vendor": "Schweitzer Engineering Laboratories",
    "versions": [
      {
        "lessThan": "R315-V4",
        "status": "affected",
        "version": "R315-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R316-V4",
        "status": "affected",
        "version": "R316-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R317-V4",
        "status": "affected",
        "version": "R317-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R318-V5",
        "status": "affected",
        "version": "R318-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R320-V3",
        "status": "affected",
        "version": "R320-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R321-V3",
        "status": "affected",
        "version": "R321-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R322-V3",
        "status": "affected",
        "version": "R322-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R323-V5",
        "status": "affected",
        "version": "R323-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R324-V4",
        "status": "affected",
        "version": "R324-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R325-V3",
        "status": "affected",
        "version": "R325-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R326-V1",
        "status": "affected",
        "version": "R326-V0",
        "versionType": "custom"
      },
      {
        "lessThan": "R327-V1",
        "status": "affected",
        "version": "R327-V0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

29.6%

Related for CVE-2023-34390