← Volver a CVEs
CVE-2023-31152
MEDIUM4.0
Descripcion
An Authentication Bypass Using an Alternate Path or Channel vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface allows Authentication Bypass. See SEL Service Bulletin dated 2022-11-15 for more details.
Detalles CVE
Puntuacion CVSS v3.14.0
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N
Vector de ataqueNETWORK
ComplejidadHIGH
Privilegios requeridosHIGH
Interaccion usuarioREQUIRED
Publicado5/10/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
selinc:sel-2241_rtac_moduleselinc:sel-2241_rtac_module_firmwareselinc:sel-3350selinc:sel-3350_firmwareselinc:sel-3505selinc:sel-3505-3selinc:sel-3505-3_firmwareselinc:sel-3505_firmwareselinc:sel-3530selinc:sel-3530-4selinc:sel-3530-4_firmwareselinc:sel-3530_firmwareselinc:sel-3532selinc:sel-3532_firmwareselinc:sel-3555selinc:sel-3555_firmwareselinc:sel-3560eselinc:sel-3560e_firmwareselinc:sel-3560sselinc:sel-3560s_firmware
Debilidades (CWE)
CWE-288CWE-287
Referencias
https://selinc.com/support/security-notifications/external-reports/(security@selinc.com)
https://www.nozominetworks.com/blog/(security@selinc.com)
https://selinc.com/support/security-notifications/external-reports/(af854a3a-2127-422b-91ae-364da2661108)
https://www.nozominetworks.com/blog/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.