Vulnerabilites related to Telit Cinterion - EHS5
CVE-2023-47613 (GCVE-0-2023-47613)
Vulnerability from cvelistv5
Published
2023-11-09 06:32
Modified
2024-09-03 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-211: Telit Cinterion (Thales/Gemalto) modules. Relative Path Traversal", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47613", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T19:34:10.939702Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:34:58.071Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "BGS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS61", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS81", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PLS62", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T17:14:03.577Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-211: Telit Cinterion (Thales/Gemalto) modules. Relative Path Traversal", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Enforce application signature verification to prohibit the installation of untrusted MIDlets on the device." }, { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47613", "datePublished": "2023-11-09T06:32:08.024Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-03T19:34:58.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47612 (GCVE-0-2023-47612)
Vulnerability from cvelistv5
Published
2023-11-09 12:07
Modified
2024-09-04 13:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-552 - Files or Directories Accessible to External Parties
Summary
A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-194: Telit Cinterion (Thales/Gemalto) modules. Files or Directories Accessible to External Parties vulnerability", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:telit_cinterion:bgs5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bgs5", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "bgs5" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:ehs5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ehs5", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "ehs5" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:ehs6:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ehs6", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "ehs6" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:ehs8:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ehs8", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "ehs8" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:pds5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pds5", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "pds5" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:pds6:pds6:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pds6", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "pds6" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:pds8:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pds8", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "pds8" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:els61:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "els61", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "els61" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:els81:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "els81", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "els81" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:pls62:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pls62", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "pls62" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-47612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:32:02.787633Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:47:01.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "BGS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS61", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS81", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PLS62", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552: Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T17:12:52.926Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-194: Telit Cinterion (Thales/Gemalto) modules. Files or Directories Accessible to External Parties vulnerability", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47612", "datePublished": "2023-11-09T12:07:54.815Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-04T13:47:01.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47610 (GCVE-0-2023-47610)
Vulnerability from cvelistv5
Published
2023-11-09 17:05
Modified
2025-02-27 20:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input
Summary
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion EHS5/6/8 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | Telit Cinterion | EHS5 | ||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-23-018: Telit Cinterion (Thales/Gemalto) modules. Buffer Copy without Checking Size of Input vulnerability", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47610", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-26T21:49:12.898675Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:34:06.677Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion EHS5/6/8 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-22T12:20:02.536Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-23-018: Telit Cinterion (Thales/Gemalto) modules. Buffer Copy without Checking Size of Input vulnerability", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/" } ], "timeline": [ { "lang": "en", "time": "2023-08-31T14:30:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-09-22T14:20:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Contact the mobile operator to disable the sending of SMS messages to the device." }, { "lang": "en", "value": "Use private APN with carefully configured security settings to limit impact of any potential exploit. Review the current security configuration in setups that already use private APN." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47610", "datePublished": "2023-11-09T17:05:38.207Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2025-02-27T20:34:06.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47615 (GCVE-0-2023-47615)
Vulnerability from cvelistv5
Published
2023-11-09 12:47
Modified
2024-09-03 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-526 - Exposure of Sensitive Information Through Environmental Variables
Summary
A CWE-526: Exposure of Sensitive Information Through Environmental Variables vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to get access to a sensitive data on the targeted system.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-212: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information Through Environmental Variables", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47615", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T19:33:54.319079Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:34:27.651Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "BGS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS61", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS81", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PLS62", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-526: Exposure of Sensitive Information Through Environmental Variables vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to get access to a sensitive data on the targeted system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-526", "description": "CWE-526: Exposure of Sensitive Information Through Environmental Variables", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T17:18:49.812Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-212: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information Through Environmental Variables", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Enforce application signature verification to prohibit the installation of untrusted MIDlets on the device." }, { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47615", "datePublished": "2023-11-09T12:47:43.253Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-03T19:34:27.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47616 (GCVE-0-2023-47616)
Vulnerability from cvelistv5
Published
2023-11-09 12:24
Modified
2024-09-03 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-193: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information to an Unauthorized Actor", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47616", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T19:34:03.922305Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:34:41.779Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "BGS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS61", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS81", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PLS62", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T17:20:44.169Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-193: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information to an Unauthorized Actor", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47616", "datePublished": "2023-11-09T12:24:33.382Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-03T19:34:41.779Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }