Vulnerability Details : CVE-2023-5326
A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-5326
- cpe:2.3:o:sato:cl4nx-j_plus_firmware:1.13.2-u455_r2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-5326
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 17 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-5326
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:A/AC:L/Au:N/C:P/I:P/A:P |
6.5
|
6.4
|
VulDB | |
6.3
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
VulDB | |
6.3
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
VulDB | 2024-02-29 |
8.8
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-5326
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: cna@vuldb.com (Primary)
References for CVE-2023-5326
-
https://vuldb.com/?ctiid.241027
Login requiredThird Party Advisory
-
https://vuldb.com/?id.241027
CVE-2023-5326: SATO CL4NX-J Plus WebConfig improper authenticationThird Party Advisory
-
https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus/README.md
CV3Cyb3R/2023/SATO CL4NX-J Plus/README.md at main · CV3TR4CK/CV3Cyb3R · GitHubThird Party Advisory
Jump to