CVE-2023-4249 (GCVE-0-2023-4249)

Vulnerability from cvelistv5 – Published: 2023-11-08 22:51 – Updated: 2025-01-16 21:26 Unsupported When Assigned
VLAI?
Title
Zavio IP Camera Stack-Based Buffer Overflow
Summary
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220, and CD321 IP Cameras with firmware version M2.1.6.05 has a command injection vulnerability in their implementation of their binaries and handling of network requests.
CWE
  • CWE-121 - Stack-Based Buffer Overflow
Assigner
Credits
Attila Szasz
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:24:03.547Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-4249",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-16T21:19:53.341994Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-16T21:26:29.040Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CF7500",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CF7300",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CF7201",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CF7501",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CB3211",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CB3212",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CB5220",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CB6231",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera B8520",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera B8220",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IP Camera CD321",
          "vendor": "Zavio",
          "versions": [
            {
              "status": "affected",
              "version": "version M2.1.6.05"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Attila Szasz "
        }
      ],
      "datePublic": "2023-10-31T20:34:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\nZavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIP Cameras \u003c/span\u003e\n\nwith firmware version M2.1.6.05 has a \ncommand injection vulnerability in their implementation of their \nbinaries and handling of network requests.\n\n"
            }
          ],
          "value": "Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras \n\nwith firmware version M2.1.6.05 has a \ncommand injection vulnerability in their implementation of their \nbinaries and handling of network requests.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-Based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-08T22:51:25.143Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
        }
      ],
      "source": {
        "advisory": "ICSA-23-304-03",
        "discovery": "EXTERNAL"
      },
      "tags": [
        "unsupported-when-assigned"
      ],
      "title": "Zavio IP Camera Stack-Based Buffer Overflow",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\n\n\n"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2023-4249",
    "datePublished": "2023-11-08T22:51:25.143Z",
    "dateReserved": "2023-08-08T19:16:25.494Z",
    "dateUpdated": "2025-01-16T21:26:29.040Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cf7500_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D543FC87-52FF-4BC4-BE57-949BB23D88AD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cf7500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30F595D2-3CB4-4444-A01F-CE38CBE2D0DC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cf7300_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FA43E48-E3D0-4913-9040-BF11D9E61385\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cf7300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B008EE1F-5B08-417A-8206-20F1362DB911\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cf7201_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A6E3CDA-3C8B-4894-A42A-CFC5AA077047\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cf7201:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5240BE7-31E4-4A40-A480-E744E3CAEA3A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cf7501_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CF6549F-9E86-4B45-8B60-BB62BEB72B19\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cf7501:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9285F916-50BE-4E41-8EF3-97D882B54CD6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cb3211_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F7DBB50-D334-493F-B661-04C798383D29\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cb3211:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C32A113-76F5-4EBD-BD15-EFBB17F0942C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cb3212_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"883549EB-5A5B-437E-8B10-D7C691142B92\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cb3212:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC86EF14-298F-414E-8558-1D025CDF6057\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cb5220_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C43C9ED3-167E-4424-841E-50A56FF398F0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cb5220:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFEC44B0-C2C7-4306-91CA-AA841B23498D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cb6231_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E8483A6-426F-4595-8B7F-1FC04E9B31FF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cb6231:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"766018BD-DD32-420A-9511-D97D9DE46BBA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:b8520_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"779DE260-60AA-465E-957D-B7502E806863\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:b8520:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F60E1FE1-F2E8-4BF7-A33D-4ED4D72BF360\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:b8220_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99AC7EEC-C4A5-4F79-9608-D02E29356217\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:b8220:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8623A941-0514-49BD-967D-E347F6F99329\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:zavio:cd321_firmware:m2.1.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35DCACBC-6483-4113-BC77-041BE4D692F9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:zavio:cd321:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E906053-BE44-45B4-AD08-D7DFCFD5EDF2\"}]}]}]",
      "cveTags": "[{\"sourceIdentifier\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"unsupported-when-assigned\"]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\\n CB6231, B8520, B8220, and CD321 \\n\\nIP Cameras \\n\\nwith firmware version M2.1.6.05 has a \\ncommand injection vulnerability in their implementation of their \\nbinaries and handling of network requests.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"IP Cameras Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220 y CD321 con versi\\u00f3n de firmware M2.1.6.05 tienen una vulnerabilidad de inyecci\\u00f3n de comandos en la implementaci\\u00f3n de sus archivos binarios y en el manejo de solicitudes de red.62611\"}]",
      "id": "CVE-2023-4249",
      "lastModified": "2024-11-21T08:34:42.810",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
      "published": "2023-11-08T23:15:11.967",
      "references": "[{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-121\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-4249\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2023-11-08T23:15:11.967\",\"lastModified\":\"2024-11-21T08:34:42.810\",\"vulnStatus\":\"Modified\",\"cveTags\":[{\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"unsupported-when-assigned\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\\n CB6231, B8520, B8220, and CD321 \\n\\nIP Cameras \\n\\nwith firmware version M2.1.6.05 has a \\ncommand injection vulnerability in their implementation of their \\nbinaries and handling of network requests.\\n\\n\"},{\"lang\":\"es\",\"value\":\"IP Cameras Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220 y CD321 con versi\u00f3n de firmware M2.1.6.05 tienen una vulnerabilidad de inyecci\u00f3n de comandos en la implementaci\u00f3n de sus archivos binarios y en el manejo de solicitudes de red.62611\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cf7500_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D543FC87-52FF-4BC4-BE57-949BB23D88AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cf7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F595D2-3CB4-4444-A01F-CE38CBE2D0DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cf7300_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FA43E48-E3D0-4913-9040-BF11D9E61385\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cf7300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B008EE1F-5B08-417A-8206-20F1362DB911\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cf7201_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6E3CDA-3C8B-4894-A42A-CFC5AA077047\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cf7201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5240BE7-31E4-4A40-A480-E744E3CAEA3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cf7501_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CF6549F-9E86-4B45-8B60-BB62BEB72B19\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cf7501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9285F916-50BE-4E41-8EF3-97D882B54CD6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cb3211_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F7DBB50-D334-493F-B661-04C798383D29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cb3211:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C32A113-76F5-4EBD-BD15-EFBB17F0942C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cb3212_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"883549EB-5A5B-437E-8B10-D7C691142B92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cb3212:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC86EF14-298F-414E-8558-1D025CDF6057\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cb5220_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C43C9ED3-167E-4424-841E-50A56FF398F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cb5220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFEC44B0-C2C7-4306-91CA-AA841B23498D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cb6231_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E8483A6-426F-4595-8B7F-1FC04E9B31FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cb6231:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766018BD-DD32-420A-9511-D97D9DE46BBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:b8520_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"779DE260-60AA-465E-957D-B7502E806863\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:b8520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F60E1FE1-F2E8-4BF7-A33D-4ED4D72BF360\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:b8220_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99AC7EEC-C4A5-4F79-9608-D02E29356217\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:b8220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8623A941-0514-49BD-967D-E347F6F99329\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zavio:cd321_firmware:m2.1.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35DCACBC-6483-4113-BC77-041BE4D692F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:zavio:cd321:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E906053-BE44-45B4-AD08-D7DFCFD5EDF2\"}]}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T07:24:03.547Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-4249\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-16T21:19:53.341994Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-16T21:19:54.805Z\"}}], \"cna\": {\"tags\": [\"unsupported-when-assigned\"], \"title\": \"Zavio IP Camera Stack-Based Buffer Overflow\", \"source\": {\"advisory\": \"ICSA-23-304-03\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Attila Szasz \"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Zavio\", \"product\": \"IP Camera CF7500\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera CF7300\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera CF7201\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera CF7501\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera CB3211\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera CB3212\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera CB5220\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera CB6231\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera B8520\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera B8220\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Zavio\", \"product\": \"IP Camera CD321\", \"versions\": [{\"status\": \"affected\", \"version\": \"version M2.1.6.05\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2023-10-31T20:34:00.000Z\", \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"\\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\u003c/span\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\\n CB6231, B8520, B8220, and CD321 \\n\\nIP Cameras \\n\\nwith firmware version M2.1.6.05 has a \\ncommand injection vulnerability in their implementation of their \\nbinaries and handling of network requests.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\nZavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\\n CB6231, B8520, B8220, and CD321 \\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eIP Cameras \u003c/span\u003e\\n\\nwith firmware version M2.1.6.05 has a \\ncommand injection vulnerability in their implementation of their \\nbinaries and handling of network requests.\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"CWE-121 Stack-Based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2023-11-08T22:51:25.143Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-4249\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-16T21:26:29.040Z\", \"dateReserved\": \"2023-08-08T19:16:25.494Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2023-11-08T22:51:25.143Z\", \"assignerShortName\": \"icscert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…