{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-29126","assignerOrgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","state":"PUBLISHED","assignerShortName":"ASRG","dateReserved":"2023-03-31T10:23:38.290Z","datePublished":"2024-11-05T15:28:53.542Z","dateUpdated":"2024-11-05T17:06:44.167Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Web Manager interface"],"product":"JuiceBox Pro 3.0 22kW Cellular","vendor":"Enel X","versions":[{"lessThanOrEqual":"2.1.1.0_JB3VU096A","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Anna Breeva (PCAutomotive)"},{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Abdellah Benotsmane (PCAutomotive)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The Waybox Enel X web management application contains a PHP-type juggling vulnerability that may allow a brute force process and under certain conditions bypass authentication."}],"value":"The Waybox Enel X web management application contains a PHP-type juggling vulnerability that may allow a brute force process and under certain conditions bypass authentication."}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":4.2,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1287","description":"CWE-1287: Improper Validation of Specified Type of Input","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","shortName":"ASRG","dateUpdated":"2024-11-05T15:28:53.542Z"},"references":[{"url":"https://support-emobility.enelx.com/content/dam/enelxmobility/italia/documenti/manuali-schede-tecniche/Waybox-3-Security-Bulletin-06-2024-V1.pdf"}],"source":{"discovery":"EXTERNAL"},"title":"Insecure loose comparison in Enel X JuiceBox","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-05T17:06:31.553877Z","id":"CVE-2023-29126","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-05T17:06:44.167Z"}}]}}