{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-45225","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2023-10-10T22:30:47.626Z","datePublished":"2023-11-08T23:00:47.061Z","dateUpdated":"2025-01-16T21:26:06.119Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"IP Camera CF7500","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera CF7300","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera CF7201","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera CF7501","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera CB3211","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera CB3212","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera CB5220","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera CB6231","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera B8520","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera B8220","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]},{"defaultStatus":"unaffected","product":"IP Camera CD321","vendor":"Zavio","versions":[{"status":"affected","version":"version M2.1.6.05"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Attila Szasz "}],"datePublic":"2023-10-31T20:34:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\nZavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\n<span style=\"background-color: rgb(255, 255, 255);\">IP Cameras</span>&nbsp; with firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. While parsing\n certain XML elements from incoming network requests, the product does \nnot sufficiently check or validate allocated buffer size. This may lead \nto remote code execution.\n\n"}],"value":"Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras  with firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. While parsing\n certain XML elements from incoming network requests, the product does \nnot sufficiently check or validate allocated buffer size. This may lead \nto remote code execution.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-121","description":"CWE-121 Stack-Based Buffer Overflow","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2023-11-08T23:00:47.061Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"}],"source":{"advisory":"ICSA-23-304-03","discovery":"EXTERNAL"},"tags":["unsupported-when-assigned"],"title":"Zavio IP Camera Stack-Based Buffer Overflow","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">The affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.</span>\n\n<br>"}],"value":"\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\n\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T20:14:20.126Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-16T21:22:15.343106Z","id":"CVE-2023-45225","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-16T21:26:06.119Z"}}]}}