{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-28369","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","dateUpdated":"2025-01-22T16:31:20.241Z","dateReserved":"2023-03-15T00:00:00.000Z","datePublished":"2023-05-18T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2023-05-18T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Brother iPrint&Scan V6.11.2 and earlier contains an improper access control vulnerability. This vulnerability may be exploited by the other app installed on the victim user's Android device, which may lead to displaying the settings and/or log information of the affected app as a print preview."}],"affected":[{"vendor":"BROTHER INDUSTRIES, LTD.","product":"Brother iPrint&Scan","versions":[{"version":"V6.11.2 and earlier","status":"affected"}]}],"references":[{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100794_000"},{"url":"https://faq.brother.co.jp/app/answers/detail/a_id/13468"},{"url":"https://play.google.com/store/apps/details?id=com.brother.mfc.brprint"},{"url":"https://jvn.jp/en/vu/JVNVU97891206/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Improper access control"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T12:38:24.988Z"},"title":"CVE Program Container","references":[{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100794_000","tags":["x_transferred"]},{"url":"https://faq.brother.co.jp/app/answers/detail/a_id/13468","tags":["x_transferred"]},{"url":"https://play.google.com/store/apps/details?id=com.brother.mfc.brprint","tags":["x_transferred"]},{"url":"https://jvn.jp/en/vu/JVNVU97891206/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-noinfo Not enough information"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":3.3,"attackVector":"LOCAL","baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","integrityImpact":"NONE","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-01-22T16:31:16.583241Z","id":"CVE-2023-28369","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-22T16:31:20.241Z"}}]}}