{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3263","assignerOrgId":"01626437-bf8f-4d1c-912a-893b5eb04808","state":"PUBLISHED","assignerShortName":"trellix","dateReserved":"2023-06-15T06:50:27.340Z","datePublished":"2023-08-14T04:02:55.740Z","dateUpdated":"2024-10-09T14:44:21.435Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Linux"],"product":"iBoot PDU","vendor":"Dataprobe","versions":[{"lessThanOrEqual":"<= 1.43.03312023","status":"affected","version":"1.43.03312023","versionType":"custom"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Sam Quinn"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution."}],"value":"The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution."}],"impacts":[{"capecId":"CAPEC-421","descriptions":[{"lang":"en","value":"CAPEC-421 Influence Perception of Authority"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-289","description":"CWE-289: Authentication Bypass by Alternate Name","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"01626437-bf8f-4d1c-912a-893b5eb04808","shortName":"trellix","dateUpdated":"2023-08-14T04:02:55.740Z"},"references":[{"url":"https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:48:08.289Z"},"title":"CVE Program Container","references":[{"url":"https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html","tags":["x_transferred"]}]},{"affected":[{"vendor":"dataprobe","product":"iboot_pdu","cpes":["cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThanOrEqual":"1.43.03312023","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-09T14:41:13.535050Z","id":"CVE-2023-3263","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-09T14:44:21.435Z"}}]}}