7.5

CVE-2023-48259

The vulnerability allows a remote unauthenticated attacker to read arbitrary content of the results database via a crafted HTTP request.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
BoschNexo-os Version >= 1000 <= 1500-sp2
   BoschNexo Cordless Nutrunner Nxa011s-36v-b (0608842012) Version-
   BoschNexo Cordless Nutrunner Nxa011s-36v (0608842011) Version-
   BoschNexo Cordless Nutrunner Nxa015s-36v-b (0608842006) Version-
   BoschNexo Cordless Nutrunner Nxa015s-36v (0608842001) Version-
   BoschNexo Cordless Nutrunner Nxa030s-36v-b (0608842007) Version-
   BoschNexo Cordless Nutrunner Nxa030s-36v (0608842002) Version-
   BoschNexo Cordless Nutrunner Nxa050s-36v-b (0608842008) Version-
   BoschNexo Cordless Nutrunner Nxa050s-36v (0608842003) Version-
   BoschNexo Cordless Nutrunner Nxa065s-36v-b (0608842014) Version-
   BoschNexo Cordless Nutrunner Nxa065s-36v (0608842013) Version-
   BoschNexo Cordless Nutrunner Nxp012qd-36v-b (0608842010) Version-
   BoschNexo Cordless Nutrunner Nxp012qd-36v (0608842005) Version-
   BoschNexo Cordless Nutrunner Nxv012t-36v-b (0608842016) Version-
   BoschNexo Cordless Nutrunner Nxv012t-36v (0608842015) Version-
   BoschNexo Special Cordless Nutrunner (0608pe2272) Version-
   BoschNexo Special Cordless Nutrunner (0608pe2301) Version-
   BoschNexo Special Cordless Nutrunner (0608pe2514) Version-
   BoschNexo Special Cordless Nutrunner (0608pe2515) Version-
   BoschNexo Special Cordless Nutrunner (0608pe2666) Version-
   BoschNexo Special Cordless Nutrunner (0608pe2673) Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.24% 0.473
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
psirt@bosch.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.