← Retour aux CVEs
CVE-2023-31152
MEDIUM4.0
Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface allows Authentication Bypass. See SEL Service Bulletin dated 2022-11-15 for more details.
Details CVE
Score CVSS v3.14.0
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisHIGH
Interaction utilisateurREQUIRED
Publie5/10/2023
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
selinc:sel-2241_rtac_moduleselinc:sel-2241_rtac_module_firmwareselinc:sel-3350selinc:sel-3350_firmwareselinc:sel-3505selinc:sel-3505-3selinc:sel-3505-3_firmwareselinc:sel-3505_firmwareselinc:sel-3530selinc:sel-3530-4selinc:sel-3530-4_firmwareselinc:sel-3530_firmwareselinc:sel-3532selinc:sel-3532_firmwareselinc:sel-3555selinc:sel-3555_firmwareselinc:sel-3560eselinc:sel-3560e_firmwareselinc:sel-3560sselinc:sel-3560s_firmware
Faiblesses (CWE)
CWE-288CWE-287
References
https://selinc.com/support/security-notifications/external-reports/(security@selinc.com)
https://www.nozominetworks.com/blog/(security@selinc.com)
https://selinc.com/support/security-notifications/external-reports/(af854a3a-2127-422b-91ae-364da2661108)
https://www.nozominetworks.com/blog/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.