Lucene search

K
cvelistTrellixCVELIST:CVE-2023-3259
HistoryAug 14, 2023 - 3:49 a.m.

CVE-2023-3259

2023-08-1403:49:59
CWE-502
trellix
www.cve.org
dataprobe iboot pdu
authentication bypass
firmware vulnerability
rogue database
administrator privileges
confidential information

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.3%

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the “iBootPduSiteAuth” cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "iBoot PDU",
    "vendor": "Dataprobe",
    "versions": [
      {
        "lessThanOrEqual": "<= 1.43.03312023",
        "status": "affected",
        "version": "1.43.03312023",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.3%

Related for CVELIST:CVE-2023-3259