Vulnerability Details : CVE-2023-4667
The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.
The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware.
This could lead to unauthorized access and data leakage
Vulnerability category: Cross site scripting (XSS)Bypass
Products affected by CVE-2023-4667
- cpe:2.3:o:idemia:sigma_wide_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:idemia:sigma_extreme_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:idemia:sgima_lite_\&_lite\+_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:idemia:morphowave_compact_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:idemia:morphowave_sp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:idemia:visionpass_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-4667
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-4667
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N |
1.7
|
5.8
|
IDEMIA | |
4.8
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
1.7
|
2.7
|
NIST |
CWE ids for CVE-2023-4667
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- a87f365f-9d39-4848-9b3a-58c7cae69cab (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-4667
-
https://www.idemia.com/vulnerability-information
Vulnerability information | IDEMIAVendor Advisory
Jump to