{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-40465","assignerOrgId":"747bec18-acd0-4d99-a5c8-5e366c66ab7e","state":"PUBLISHED","assignerShortName":"SWI","dateReserved":"2023-08-14T20:59:20.798Z","datePublished":"2023-12-04T23:02:04.103Z","dateUpdated":"2024-08-02T18:31:53.825Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"ALEOS","vendor":"SierraWireless","versions":[{"lessThanOrEqual":"4.16","status":"affected","version":"4.10","versionType":"Custom"},{"lessThanOrEqual":"4.9.8","status":"affected","version":"0","versionType":"Custom"}]}],"datePublic":"2023-11-28T18:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n\n\n\n\n\n\n\n\n\n<p>Several versions of\nALEOS, including ALEOS 4.16.0, include an opensource</p>\n\n<p>third-party\ncomponent which can be exploited from the local</p>\n\n<p>area network,\nresulting in a Denial of Service condition for the captive portal.</p>\n\n\n\n\n\n"}],"value":"\n\n\n\n\n\n\n\n\n\nSeveral versions of\nALEOS, including ALEOS 4.16.0, include an opensource\n\n\n\nthird-party\ncomponent which can be exploited from the local\n\n\n\narea network,\nresulting in a Denial of Service condition for the captive portal.\n\n\n\n\n\n\n\n"}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"Remote-Code Execution"}]},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"Denial of Service"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-121","description":"CWE-121","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-122","description":"CWE-122","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"747bec18-acd0-4d99-a5c8-5e366c66ab7e","shortName":"SWI","dateUpdated":"2023-12-04T23:02:04.103Z"},"references":[{"url":"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs"}],"source":{"discovery":"UNKNOWN"},"title":"Improper input leads to DoS","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T18:31:53.825Z"},"title":"CVE Program Container","references":[{"url":"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs","tags":["x_transferred"]}]}]}}