9.8

CVE-2023-28386

Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SnaponeOrvc SwPlatformpro Version < 7.3.0
   Control4Ca-1 Version-
   Control4Ca-10 Version-
   Control4Ea-1 Version-
   Control4Ea-3 Version-
   Control4Ea-5 Version-
   SnaponeAn-110-rt-2l1w Version-
   SnaponeAn-110-rt-2l1w-wifi Version-
   SnaponeAn-310-rt-4l2w Version-
   SnaponeOvrc-300-pro Version-
   SnaponePakedge Rk-1 Version-
   SnaponePakedge Rt-3100 Version-
   SnaponePakedge Wr-1 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.281
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ics-cert@hq.dhs.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
CWE-345 Insufficient Verification of Data Authenticity

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

CWE-354 Improper Validation of Integrity Check Value

The product does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.