{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-41921","assignerOrgId":"cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39","state":"PUBLISHED","assignerShortName":"NCSC-NL","dateReserved":"2023-09-05T10:14:50.216Z","datePublished":"2024-07-02T07:42:33.722Z","dateUpdated":"2024-08-02T19:09:49.427Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39","shortName":"NCSC-NL","dateUpdated":"2024-07-02T08:20:37.969Z"},"title":"Download of Code Without Integrity Check in Kiloview P1/P2 devices","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-494","description":"CWE-494 Download of Code Without Integrity Check","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-184","descriptions":[{"lang":"en","value":"CAPEC-184 Software Integrity Attack"}]}],"affected":[{"vendor":"Kiloview","product":"P1/P2","versions":[{"status":"affected","version":"All","lessThanOrEqual":"4.8.2605","versionType":"custom"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state.","supportingMedia":[{"type":"text/html","base64":false,"value":"<span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgba(255, 255, 255, 0.7);\">A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state.</span>\n\n</span>\n\n"}]}],"references":[{"url":"https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"CRITICAL","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}}],"source":{"discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"kiloview","product":"p1_4g_video_encoder_firmware","cpes":["cpe:2.3:o:kiloview:p1_4g_video_encoder_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"kiloview","product":"p2_4g_video_encoder_firmware","cpes":["cpe:2.3:o:kiloview:p2_4g_video_encoder_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-02T10:51:11.223029Z","id":"CVE-2023-41921","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-02T10:51:15.140Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:09:49.427Z"},"title":"CVE Program Container","references":[{"url":"https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273","tags":["x_transferred"]}]}]}}