{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-48375","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2023-11-16T03:49:45.971Z","datePublished":"2023-12-15T07:46:16.462Z","dateUpdated":"2024-08-02T21:30:34.755Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"CWS Web-Base","vendor":"SmartStar Software","versions":[{"status":"affected","version":"v10.25"}]}],"datePublic":"2023-12-15T07:50:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"SmartStar Software CWS is a web-based integration platform, it has a vulnerability of missing authorization and users are able to access data or perform actions that they should not be allowed to perform via commands. An authenticated with normal user privilege can execute administrator privilege, resulting in performing arbitrary system operations or disrupting service."}],"value":"SmartStar Software CWS is a web-based integration platform, it has a vulnerability of missing authorization and users are able to access data or perform actions that they should not be allowed to perform via commands. An authenticated with normal user privilege can execute administrator privilege, resulting in performing arbitrary system operations or disrupting service."}],"impacts":[{"capecId":"CAPEC-665","descriptions":[{"lang":"en","value":"CAPEC-665 Exploitation of Thunderbolt Protection Flaws"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-862","description":"CWE-862 Missing Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2023-12-15T07:46:16.462Z"},"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-7594-dac20-1.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\nUpdate to the latest version.\n\n<br>"}],"value":"\nUpdate to the latest version.\n\n\n"}],"source":{"advisory":"TVN-202312005","discovery":"EXTERNAL"},"title":"SmartStar Software CWS Web-Base - Broken Access Control","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T21:30:34.755Z"},"title":"CVE Program Container","references":[{"url":"https://www.twcert.org.tw/tw/cp-132-7594-dac20-1.html","tags":["x_transferred"]}]}]}}