Lucene search

K
cveDragosCVE-2023-40707
HistoryAug 24, 2023 - 5:15 p.m.

CVE-2023-40707

2023-08-2417:15:08
CWE-521
Dragos
web.nvd.nist.gov
19
snap pac s1
firmware
r10.3b
brute force attack
complex password
nvd

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

28.7%

There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don’t set up complex credentials.

Affected configurations

Nvd
Node
opto22snap_pac_s1_firmwareMatchr10.3b
AND
opto22snap_pac_s1Match-
VendorProductVersionCPE
opto22snap_pac_s1_firmwarer10.3bcpe:2.3:o:opto22:snap_pac_s1_firmware:r10.3b:*:*:*:*:*:*:*
opto22snap_pac_s1-cpe:2.3:h:opto22:snap_pac_s1:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SNAP PAC S1",
    "vendor": "OPTO 22",
    "versions": [
      {
        "status": "affected",
        "version": "R10.3b"
      }
    ]
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

28.7%

Related for CVE-2023-40707