10

CVE-2023-31241

Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SnaponeOrvc SwPlatformpro Version < 7.3.0
   Control4Ca-1 Version-
   Control4Ca-10 Version-
   Control4Ea-1 Version-
   Control4Ea-3 Version-
   Control4Ea-5 Version-
   SnaponeAn-110-rt-2l1w Version-
   SnaponeAn-110-rt-2l1w-wifi Version-
   SnaponeAn-310-rt-4l2w Version-
   SnaponeOvrc-300-pro Version-
   SnaponePakedge Rk-1 Version-
   SnaponePakedge Rt-3100 Version-
   SnaponePakedge Wr-1 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.016
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 3.9 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
ics-cert@hq.dhs.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-420 Unprotected Alternate Channel

The product protects a primary channel, but it does not use the same level of protection for an alternate channel.