8.8
CVE-2023-38555
- EPSS 0.05%
- Veröffentlicht 26.07.2023 08:15:10
- Zuletzt bearbeitet 21.11.2024 08:13:49
- Quelle vultures@jpcert.or.jp
- Teams Watchlist Login
- Unerledigt Login
Authentication bypass vulnerability in Fujitsu network devices Si-R series and SR-M series allows a network-adjacent unauthenticated attacker to obtain, change, and/or reset configuration settings of the affected products. Affected products and versions are as follows: Si-R 30B all versions, Si-R 130B all versions, Si-R 90brin all versions, Si-R570B all versions, Si-R370B all versions, Si-R220D all versions, Si-R G100 V02.54 and earlier, Si-R G200 V02.54 and earlier, Si-R G100B V04.12 and earlier, Si-R G110B V04.12 and earlier, Si-R G200B V04.12 and earlier, Si-R G210 V20.52 and earlier, Si-R G211 V20.52 and earlier, Si-R G120 V20.52 and earlier, Si-R G121 V20.52 and earlier, and SR-M 50AP1 all versions.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fujitsu ≫ Si-r G100 Firmware Version <= 02.54
Fujitsu ≫ Si-r G200 Firmware Version <= 02.54
Fujitsu ≫ Si-r G100b Firmware Version <= 04.12
Fujitsu ≫ Si-r G110b Firmware Version <= 04.12
Fujitsu ≫ Si-r G200b Firmware Version <= 04.12
Fujitsu ≫ Si-r G210 Firmware Version <= 20.52
Fujitsu ≫ Si-r G211 Firmware Version <= 20.52
Fujitsu ≫ Si-r G120 Firmware Version <= 20.52
Fujitsu ≫ Si-r G121 Firmware Version <= 20.52
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.164 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.