Vulnerability Details : CVE-2023-39544
CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.
Products affected by CVE-2023-39544
- cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:windows:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-39544
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39544
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-39544
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by:
- nvd@nist.gov (Primary)
- psirt-info@cyber.jp.nec.com (Secondary)
References for CVE-2023-39544
-
https://jpn.nec.com/security-info/secinfo/nv23-009_en.html
NV23-009_en: セキュリティ情報 | NECPatch;Third Party Advisory
Jump to