{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-28368","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","dateUpdated":"2025-02-10T20:54:23.215Z","dateReserved":"2023-03-15T00:00:00.000Z","datePublished":"2023-04-11T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2023-04-11T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"TP-Link L2 switch T2600G-28SQ firmware versions prior to 'T2600G-28SQ(UN)_V1_1.0.6 Build 20230227' uses vulnerable SSH host keys. A fake device may be prepared to spoof the affected device with the vulnerable host key.If the administrator may be tricked to login to the fake device, the credential information for the affected device may be obtained."}],"affected":[{"vendor":"TP-Link Corporation Limited","product":"T2600G-28SQ","versions":[{"version":"firmware versions prior to 'T2600G-28SQ(UN)_V1_1.0.6 Build 20230227'","status":"affected"}]}],"references":[{"url":"https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware"},{"url":"https://jvn.jp/en/jp/JVN62420378/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Use of weak credentials"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T12:38:25.201Z"},"title":"CVE Program Container","references":[{"url":"https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware","tags":["x_transferred"]},{"url":"https://jvn.jp/en/jp/JVN62420378/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1391","lang":"en","description":"CWE-1391 Use of Weak Credentials"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.7,"attackVector":"ADJACENT_NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-10T20:52:43.588129Z","id":"CVE-2023-28368","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-10T20:54:23.215Z"}}]}}