7.5
CVE-2023-0956
- EPSS 0.59%
- Veröffentlicht 03.08.2023 19:15:10
- Zuletzt bearbeitet 21.11.2024 07:38:10
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
External input could be used on TEL-STER TelWin SCADA WebInterface to construct paths to files and directories without properly neutralizing special elements within the pathname, which could allow an unauthenticated attacker to read files on the system.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tel-ster ≫ Telwin Scada Webinterface Version >= 3.2 < 6.2
Tel-ster ≫ Telwin Scada Webinterface Version >= 7.0 < 7.2
Tel-ster ≫ Telwin Scada Webinterface Version8.0
Tel-ster ≫ Telwin Scada Webinterface Version9.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.59% | 0.684 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| ics-cert@hq.dhs.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.