Vulnerability Details : CVE-2023-6118
Path Traversal: '/../filedir' vulnerability in Neutron IP Camera allows Absolute Path Traversal.This issue affects IP Camera: before b1130.1.0.1.
Published
2023-11-23 15:15:11
Updated
2023-11-30 21:03:10
Vulnerability category: Directory traversal
Products affected by CVE-2023-6118
- cpe:2.3:o:neutron:neu-ipb210-28_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ntl-pt-06wod-3mp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:neu-ipb410-28_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ntl-bc-01w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:neu-ipbm211_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ntl-pt-09-wos-3mp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:neu-ipbm411_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ntl-pt-10-4gwos-3mp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ipc2224-sr3-npf-36_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ipc2624-sr3-npf-36_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ntl-bc-03-snm_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ntl-bc-03-snp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:neu-ipd220-28_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ntl-bc01-m_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:neu-ipdm221_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:neu-ipdm421_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:neutron:ntl-ip05-3mp_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6118
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6118
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
Computer Emergency Response Team of the Republic of Turkey |
CWE ids for CVE-2023-6118
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
-
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "/../" sequences that can resolve to a location that is outside of that directory.Assigned by: iletisim@usom.gov.tr (Secondary)
References for CVE-2023-6118
-
https://www.usom.gov.tr/bildirim/tr-23-0658
Third Party Advisory
Jump to