Vulnerability Details : CVE-2023-39545
CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.
Products affected by CVE-2023-39545
- cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:windows:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:linux:*:*
- cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:windows:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-39545
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 17 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39545
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-39545
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by:
- nvd@nist.gov (Primary)
- psirt-info@cyber.jp.nec.com (Secondary)
References for CVE-2023-39545
-
https://jpn.nec.com/security-info/secinfo/nv23-009_en.html
NV23-009_en: セキュリティ情報 | NECPatch;Third Party Advisory
Jump to