{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6355","assignerOrgId":"0c426f27-3ee1-4eff-be88-288d5a1822bc","state":"PUBLISHED","assignerShortName":"Gallagher","dateReserved":"2023-11-28T03:08:23.484Z","datePublished":"2023-12-18T21:55:58.148Z","dateUpdated":"2024-08-02T08:28:21.793Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Controller 7000","vendor":"Gallagher","versions":[{"lessThan":"vCR9.00.231204b","status":"affected","version":"9.00","versionType":"custom"},{"lessThan":"vCR8.90.231204a","status":"affected","version":"8.90","versionType":"custom"},{"lessThan":"vCR8.80.231204a","status":"affected","version":"8.80","versionType":"custom"},{"lessThan":"vCR8.70.231204a","status":"affected","version":"8.70","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">Incorrect selection of fuse values in the Controller 7000 platform allows an attacker to bypass some protection mechanisms to enable local debug. </span><br><br><span style=\"background-color: rgb(255, 255, 255);\">This issue affects: Gallagher Controller 7000 </span>9.00 prior to vCR9.00.231204b (distributed in 9.00.1507 (MR1)), 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), <span style=\"background-color: rgb(255, 255, 255);\">8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)),</span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\">8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)).</span>\n\n"}],"value":"\nIncorrect selection of fuse values in the Controller 7000 platform allows an attacker to bypass some protection mechanisms to enable local debug. \n\nThis issue affects: Gallagher Controller 7000 9.00 prior to vCR9.00.231204b (distributed in 9.00.1507 (MR1)), 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)).\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"PHYSICAL","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1253","description":"CWE-1253: Incorrect Selection of Fuse Values","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"0c426f27-3ee1-4eff-be88-288d5a1822bc","shortName":"Gallagher","dateUpdated":"2023-12-18T21:55:58.148Z"},"references":[{"url":"https://security.gallagher.com/Security-Advisories/CVE-2023-6355"}],"source":{"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:28:21.793Z"},"title":"CVE Program Container","references":[{"url":"https://security.gallagher.com/Security-Advisories/CVE-2023-6355","tags":["x_transferred"]}]}]}}