{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-36611","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2023-06-23T20:39:08.361Z","datePublished":"2023-07-03T20:03:07.721Z","dateUpdated":"2024-10-25T13:08:42.739Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"TBox MS-CPU32","vendor":"Ovarro","versions":[{"lessThanOrEqual":"1.50.598","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"​TBox MS-CPU32-S2","vendor":"Ovarro","versions":[{"lessThanOrEqual":"1.50.598","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"TBox LT2","vendor":"Ovarro","versions":[{"lessThanOrEqual":"1.50.598","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"TBox TG2","vendor":"Ovarro","versions":[{"lessThanOrEqual":"1.50.598","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"TBox RM2","vendor":"Ovarro","versions":[{"lessThanOrEqual":"1.50.598","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Floris Hendriks"},{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Jeroen Wijenbergh"},{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Radboud University"}],"datePublic":"2023-06-29T18:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">The affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with “user” privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens.</span>\n\n"}],"value":"\nThe affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with “user” privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"CWE-285 Improper Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2023-07-03T20:03:07.721Z"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T16:52:54.051Z"},"title":"CVE Program Container","references":[{"tags":["government-resource","x_transferred"],"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-25T13:04:51.270877Z","id":"CVE-2023-36611","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-25T13:08:42.739Z"}}]}}