CVE-2023-46663 (GCVE-0-2023-46663)

Vulnerability from cvelistv5 – Published: 2023-10-26 20:02 – Updated: 2025-01-16 21:27
VLAI?
Title
Improper Access Control in Sielco PolyEco1000
Summary
Sielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.
CWE
  • CWE-284 - Improper Access Control
Assigner
Impacted products
Vendor Product Version
Sielco PolyEco1000 Affected: CPU:2.0.6 FPGA:10.19
Affected: CPU:1.9.4 FPGA:10.19
Affected: CPU:1.9.3 FPGA:10.19
Affected: CPU:1.7.0 FPGA:10.16
Affected: CPU:2.0.2 FPGA:10.19
Affected: CPU:2.0.0 FPGA:10.19
Create a notification for this product.
Credits
Gjoko Krstic
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:53:20.652Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46663",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-16T21:20:39.161131Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-16T21:27:13.130Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PolyEco1000",
          "vendor": "Sielco ",
          "versions": [
            {
              "status": "affected",
              "version": "CPU:2.0.6 FPGA:10.19"
            },
            {
              "status": "affected",
              "version": "CPU:1.9.4 FPGA:10.19"
            },
            {
              "status": "affected",
              "version": "CPU:1.9.3 FPGA:10.19"
            },
            {
              "status": "affected",
              "version": "CPU:1.7.0 FPGA:10.16"
            },
            {
              "status": "affected",
              "version": "CPU:2.0.2 FPGA:10.19"
            },
            {
              "status": "affected",
              "version": "CPU:2.0.0 FPGA:10.19"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Gjoko Krstic"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003eSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\u003c/p\u003e\n\n"
            }
          ],
          "value": "\n\n\n\n\n\n\n\n\nSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\n\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-26T20:02:24.004Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper Access Control in Sielco PolyEco1000",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2023-46663",
    "datePublished": "2023-10-26T20:02:24.004Z",
    "dateReserved": "2023-10-24T16:27:17.282Z",
    "dateUpdated": "2025-01-16T21:27:13.130Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco500_firmware:1.7.0:*:*:*:cpu:*:*:*\", \"matchCriteriaId\": \"E64F96A4-542A-486E-AC9A-3EC1E68A6D1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco500_firmware:10.16:*:*:*:fpga:*:*:*\", \"matchCriteriaId\": \"E3A4049B-D0B2-4CB6-8B31-ECD3BF4FF384\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:sielco:polyeco500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7E931F0-5608-4F24-821B-3DB29972C077\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco300_firmware:2.0.0:*:*:*:cpu:*:*:*\", \"matchCriteriaId\": \"BBA5260D-A7D3-4973-8106-E8C73F50A6CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco300_firmware:2.0.2:*:*:*:cpu:*:*:*\", \"matchCriteriaId\": \"F7CE9236-A970-49F0-A200-84BC3B77CECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco300_firmware:10.19:*:*:*:fpga:*:*:*\", \"matchCriteriaId\": \"D45CE1CD-FB47-4FFD-974E-B55B569A5850\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:sielco:polyeco300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05832105-6C9E-4850-A145-F3E241058CCA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco1000_firmware:1.9.3:*:*:*:cpu:*:*:*\", \"matchCriteriaId\": \"991B1AD8-671D-4EF9-901B-0834748258F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco1000_firmware:1.9.4:*:*:*:cpu:*:*:*\", \"matchCriteriaId\": \"FE961B31-1553-4457-8436-8F9662AA10CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco1000_firmware:2.0.6:*:*:*:cpu:*:*:*\", \"matchCriteriaId\": \"0BF0380D-483C-4B14-BF42-AC1E9C79D2DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:sielco:polyeco1000_firmware:10.19:*:*:*:fpga:*:*:*\", \"matchCriteriaId\": \"F0E5773E-8842-4FCB-80BD-266A237042E7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:sielco:polyeco1000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01DB9D87-6F35-4171-AD59-9B90386F431E\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"\\n\\n\\n\\n\\n\\n\\n\\n\\nSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\\n\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Sielco PolyEco1000 es vulnerable a que un atacante omita la autorizaci\\u00f3n y acceda a recursos detr\\u00e1s de p\\u00e1ginas protegidas. La interfaz de la aplicaci\\u00f3n permite a los usuarios realizar ciertas acciones a trav\\u00e9s de solicitudes HTTP sin realizar ninguna verificaci\\u00f3n de validez para verificar las solicitudes.\"}]",
      "id": "CVE-2023-46663",
      "lastModified": "2024-11-21T08:29:00.747",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.2}]}",
      "published": "2023-10-26T21:15:07.903",
      "references": "[{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-284\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-46663\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2023-10-26T21:15:07.903\",\"lastModified\":\"2024-11-21T08:29:00.747\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\n\\n\\n\\n\\n\\n\\n\\n\\nSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Sielco PolyEco1000 es vulnerable a que un atacante omita la autorizaci\u00f3n y acceda a recursos detr\u00e1s de p\u00e1ginas protegidas. La interfaz de la aplicaci\u00f3n permite a los usuarios realizar ciertas acciones a trav\u00e9s de solicitudes HTTP sin realizar ninguna verificaci\u00f3n de validez para verificar las solicitudes.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco500_firmware:1.7.0:*:*:*:cpu:*:*:*\",\"matchCriteriaId\":\"E64F96A4-542A-486E-AC9A-3EC1E68A6D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco500_firmware:10.16:*:*:*:fpga:*:*:*\",\"matchCriteriaId\":\"E3A4049B-D0B2-4CB6-8B31-ECD3BF4FF384\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sielco:polyeco500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E931F0-5608-4F24-821B-3DB29972C077\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco300_firmware:2.0.0:*:*:*:cpu:*:*:*\",\"matchCriteriaId\":\"BBA5260D-A7D3-4973-8106-E8C73F50A6CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco300_firmware:2.0.2:*:*:*:cpu:*:*:*\",\"matchCriteriaId\":\"F7CE9236-A970-49F0-A200-84BC3B77CECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco300_firmware:10.19:*:*:*:fpga:*:*:*\",\"matchCriteriaId\":\"D45CE1CD-FB47-4FFD-974E-B55B569A5850\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sielco:polyeco300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05832105-6C9E-4850-A145-F3E241058CCA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco1000_firmware:1.9.3:*:*:*:cpu:*:*:*\",\"matchCriteriaId\":\"991B1AD8-671D-4EF9-901B-0834748258F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco1000_firmware:1.9.4:*:*:*:cpu:*:*:*\",\"matchCriteriaId\":\"FE961B31-1553-4457-8436-8F9662AA10CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco1000_firmware:2.0.6:*:*:*:cpu:*:*:*\",\"matchCriteriaId\":\"0BF0380D-483C-4B14-BF42-AC1E9C79D2DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sielco:polyeco1000_firmware:10.19:*:*:*:fpga:*:*:*\",\"matchCriteriaId\":\"F0E5773E-8842-4FCB-80BD-266A237042E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sielco:polyeco1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01DB9D87-6F35-4171-AD59-9B90386F431E\"}]}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T20:53:20.652Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-46663\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-16T21:20:39.161131Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-16T21:20:40.653Z\"}}], \"cna\": {\"title\": \"Improper Access Control in Sielco PolyEco1000\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Gjoko Krstic\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Sielco \", \"product\": \"PolyEco1000\", \"versions\": [{\"status\": \"affected\", \"version\": \"CPU:2.0.6 FPGA:10.19\"}, {\"status\": \"affected\", \"version\": \"CPU:1.9.4 FPGA:10.19\"}, {\"status\": \"affected\", \"version\": \"CPU:1.9.3 FPGA:10.19\"}, {\"status\": \"affected\", \"version\": \"CPU:1.7.0 FPGA:10.16\"}, {\"status\": \"affected\", \"version\": \"CPU:2.0.2 FPGA:10.19\"}, {\"status\": \"affected\", \"version\": \"CPU:2.0.0 FPGA:10.19\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\n\\n\\n\\n\\n\\n\\n\\n\\nSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cp\u003e\u003c/p\u003e\\n\\n\u003cp\u003e\u003c/p\u003e\\n\\n\u003cp\u003eSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\u003c/p\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"CWE-284 Improper Access Control\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2023-10-26T20:02:24.004Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-46663\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-16T21:27:13.130Z\", \"dateReserved\": \"2023-10-24T16:27:17.282Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2023-10-26T20:02:24.004Z\", \"assignerShortName\": \"icscert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…