Lucene search

K
nvd[email protected]NVD:CVE-2023-28610
HistoryMar 23, 2023 - 4:15 p.m.

CVE-2023-28610

2023-03-2316:15:12
web.nvd.nist.gov
1
omicron
stationguard
stationscout
update process
vulnerability
remote access

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.003

Percentile

69.2%

The update process in OMICRON StationGuard and OMICRON StationScout before 2.21 can be exploited by providing a modified firmware update image. This allows a remote attacker to gain root access to the system.

Affected configurations

Nvd
Node
omicronenergystationguardRange2.20
OR
omicronenergystationscoutRange2.20
VendorProductVersionCPE
omicronenergystationguard*cpe:2.3:a:omicronenergy:stationguard:*:*:*:*:*:*:*:*
omicronenergystationscout*cpe:2.3:a:omicronenergy:stationscout:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.003

Percentile

69.2%

Related for NVD:CVE-2023-28610