gsd-2023-5629
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A CWE-601:URL Redirection to Untrusted Site (‘Open Redirect’) vulnerability exists that could
cause disclosure of information through phishing attempts over HTTP.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-5629",
"id": "GSD-2023-5629"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-5629"
],
"details": "\nA CWE-601:URL Redirection to Untrusted Site (\u2018Open Redirect\u2019) vulnerability exists that could\ncause disclosure of information through phishing attempts over HTTP.\n\n",
"id": "GSD-2023-5629",
"modified": "2023-12-13T01:20:51.064570Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@schneider-electric.com",
"ID": "CVE-2023-5629",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Trio Q-Series Ethernet Data Radio",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Versions prior to 2.7.0"
}
]
}
},
{
"product_name": "Trio E-Series Ethernet Data Radio",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All versions of models ER45e, EB45e, EH45e"
}
]
}
},
{
"product_name": "Trio J-Series Ethernet Data Radio",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All Versions"
}
]
}
}
]
},
"vendor_name": "Schneider Electric"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "\nA CWE-601:URL Redirection to Untrusted Site (\u2018Open Redirect\u2019) vulnerability exists that could\ncause disclosure of information through phishing attempts over HTTP.\n\n"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-601",
"lang": "eng",
"value": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-346-01.pdf",
"refsource": "MISC",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-346-01.pdf"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:eb450_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21062F1C-3DFF-423E-B877-9EC4A7512C8F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:eb450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93C4743E-EA8F-41F7-B927-59119186EE58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:eb45e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F87662D7-090B-4102-97EA-953E82EDC6D7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:eb45e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F330AF13-C6E6-4BC3-80B1-717D755CB304",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:eh450_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02F28552-804B-4E93-9C0B-459432F4C7D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:eh450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A3352D-B514-4A6F-88F9-B22FC87B223A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:eh45e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "030A8208-5ABB-4F4D-BF37-70A8FB0F99E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:eh45e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C624E8B-75CF-4176-B74B-1132B4CBDB65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:er450_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "944C4A5F-5CBA-4169-8ED9-DC3BAF5EEC04",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:er450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70F26352-CB68-4674-B71F-697E86D36217",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:er45e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A097E0-13E2-45F2-AF8E-E5EA4D1AEE7D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:er45e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59E1DDCC-E95A-4FBF-99AD-3225DD03C0F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:jr240_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "644B0D04-1D2B-42BF-A43F-9155DE63BCE4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:jr240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CAB2776-BC11-4CD5-B0AE-EFCB89D04C86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:jr900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36FE5F9E-FDA4-40C6-82A5-27CAA02B3D04",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:jr900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D30DB44F-D82C-4072-82EF-9BC9D2EC27C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:qr450_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C186BF8E-C108-4689-A34A-324A95CF589F",
"versionEndExcluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:qr450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2441EF-2DD9-4174-8421-3F521F96CE1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:qr150_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50B32D14-79D7-45FB-8C11-7B95B37083A1",
"versionEndExcluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:qr150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49302836-DFBE-454A-AB83-4638CB684BF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:qb450_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74F7A88E-A0BB-43B5-B54F-385A02790FE3",
"versionEndExcluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:qb450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "004A77A5-5E91-4EDA-A10D-F03932B2A873",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:qb150_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67092820-EB7F-475C-903D-9A0B0AF34CD9",
"versionEndExcluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:qb150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D82FD907-1946-4E02-9AAE-749D8DDF766D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:qp450_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F7B149E-AA67-4F69-A620-385AEB48832A",
"versionEndExcluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:qp450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE6FD95-99FA-4A74-840F-D3E32FF48166",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:qp150_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6C3BE6-A707-4779-AE91-A6993994627E",
"versionEndExcluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:qp150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE803BD-F5A3-4BB4-995B-02E395E667F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:qh450_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF6A365-9AF7-4D1C-ACBF-C607EB78F0AC",
"versionEndExcluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:qh450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AA4D76-E32C-4EE5-B36F-6DF1827B35DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:qh150_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4EA25C-AD2C-4610-8159-5A4FA8F1F008",
"versionEndExcluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:qh150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5ABB78-4B7E-4C24-BA89-8798059B3B56",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"descriptions": [
{
"lang": "en",
"value": "\nA CWE-601:URL Redirection to Untrusted Site (\u2018Open Redirect\u2019) vulnerability exists that could\ncause disclosure of information through phishing attempts over HTTP.\n\n"
},
{
"lang": "es",
"value": "Existe una vulnerabilidad CWE-601: Redirecci\u00f3n de URL a un sitio que no es de confianza (\"Open Redirect\") que podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n mediante intentos de phishing a trav\u00e9s de HTTP."
}
],
"id": "CVE-2023-5629",
"lastModified": "2023-12-27T18:45:15.347",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7,
"source": "cybersecurity@se.com",
"type": "Secondary"
}
]
},
"published": "2023-12-14T05:15:12.463",
"references": [
{
"source": "cybersecurity@se.com",
"tags": [
"Vendor Advisory"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-346-01.pdf"
}
],
"sourceIdentifier": "cybersecurity@se.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "cybersecurity@se.com",
"type": "Primary"
}
]
}
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…