Vulnerabilites related to telit - bgs5_firmware
CVE-2023-47614 (GCVE-0-2023-47614)
Vulnerability from cvelistv5
Published
2023-11-10 15:50
Modified
2024-09-03 17:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to disclose hidden virtual paths and file names on the targeted system.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Telit Cinterion | BGS5 |
Version: * < 2.000 ARN 01.001.08 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-210: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information to an Unauthorized Actor vulnerability", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-210-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor-vulnerability/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47614", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T17:36:50.567934Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T17:37:01.547Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "BGS5", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000 ARN 01.001.08", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS5-E", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS5-US", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS5-US Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6 Rel.2", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000 ARN 00.000.20", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6 Rel.3", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "3.001 ARN 00.000.49", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6 Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6-A Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS8", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "3.011 ARN 00.000.60", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS8 Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-AUS", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-AUS Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.004 ARN 00.003.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-AUS Rel.1 MR", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.005 ARN 00.005.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000 ARN 00.030.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E Rel.1 MR", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000 ARN 00.032.02", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E Rel.2", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000 ARN 01.000.03", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E Rel.2", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000 ARN 01.000.03", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E2 Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000 ARN 00.026.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E2 Rel.1 MR", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000 ARN 00.032.02", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-US Rel.1 MR", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.01 ARN 00.028.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-US Rel.2", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.012 ARN 01.000.05", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-E", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-E Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.000 ARN 01.000.05", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-E Rel.1.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "5.001 ARN 01.000.04", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-US", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "5.012", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-US Rel.1.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "5.012 ARN 01.000.05", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PDS5-E", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "3.001", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PDS5-E Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "3.001 ARN 00.000.32", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PDS5-E Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "PDS5-US", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "unaffected", "product": "PLS62-W", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PLS62-W Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.01 ARN 01.000.05", "status": "affected", "version": "*", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to disclose hidden virtual paths and file names on the targeted system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-10T15:50:24.884Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-210: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information to an Unauthorized Actor vulnerability", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-210-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor-vulnerability/" } ], "solutions": [ { "lang": "en", "value": "Telit Cinterion has released firmware updates to fix the issue. Contact Telit Cinterion for assistance." } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Enforce application signature verification to prohibit the installation of untrusted MIDlets on the device." }, { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47614", "datePublished": "2023-11-10T15:50:24.884Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-03T17:37:01.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47613 (GCVE-0-2023-47613)
Vulnerability from cvelistv5
Published
2023-11-09 06:32
Modified
2024-09-03 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-211: Telit Cinterion (Thales/Gemalto) modules. Relative Path Traversal", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47613", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T19:34:10.939702Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:34:58.071Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "BGS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS61", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS81", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PLS62", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T17:14:03.577Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-211: Telit Cinterion (Thales/Gemalto) modules. Relative Path Traversal", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Enforce application signature verification to prohibit the installation of untrusted MIDlets on the device." }, { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47613", "datePublished": "2023-11-09T06:32:08.024Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-03T19:34:58.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47611 (GCVE-0-2023-47611)
Vulnerability from cvelistv5
Published
2023-11-10 16:38
Modified
2024-08-02 21:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A CWE-269: Improper Privilege Management vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to elevate privileges to "manufacturer" level on the targeted system.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Telit Cinterion | BGS5 |
Version: * < 2.000 ARN 01.001.08 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-216: Telit Cinterion (Thales/Gemalto) modules. Improper Privilege Management vulnerability", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "BGS5", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000 ARN 01.001.08", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS5-E", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS5-US", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS5-US Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6 Rel.2", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000 ARN 00.000.20", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6 Rel.3", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "3.001 ARN 00.000.49", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6 Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS6-A Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS8", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "3.011 ARN 00.000.60", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EHS8 Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-AUS", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-AUS Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.004 ARN 00.003.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-AUS Rel.1 MR", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.005 ARN 00.005.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000 ARN 00.030.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E Rel.1 MR", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000 ARN 00.032.02", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E Rel.2", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000 ARN 01.000.03", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E Rel.2", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.000 ARN 01.000.03", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E2 Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000 ARN 00.026.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-E2 Rel.1 MR", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.000 ARN 00.032.02", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-US Rel.1 MR", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "1.01 ARN 00.028.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS61-US Rel.2", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.012 ARN 01.000.05", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-E", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.000", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-E Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.000 ARN 01.000.05", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-E Rel.1.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "5.001 ARN 01.000.04", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-US", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "5.012", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ELS81-US Rel.1.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "5.012 ARN 01.000.05", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PDS5-E", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "3.001", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PDS5-E Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "3.001 ARN 00.000.32", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PDS5-E Rel.4", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "4.013 ARN 01.000.06", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "affected", "product": "PDS5-US", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "unaffected", "product": "PLS62-W", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.01", "status": "affected", "version": "*", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PLS62-W Rel.1", "vendor": "Telit Cinterion", "versions": [ { "lessThan": "2.01 ARN 01.000.05", "status": "affected", "version": "*", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-269: Improper Privilege Management vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to elevate privileges to \"manufacturer\" level on the targeted system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-10T16:38:54.668Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-216: Telit Cinterion (Thales/Gemalto) modules. Improper Privilege Management vulnerability", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/" } ], "solutions": [ { "lang": "en", "value": "Telit Cinterion has released firmware updates to fix the issue. Contact Telit Cinterion for assistance." } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Enforce application signature verification to prohibit the installation of untrusted MIDlets on the device." }, { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47611", "datePublished": "2023-11-10T16:38:54.668Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-08-02T21:09:37.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47612 (GCVE-0-2023-47612)
Vulnerability from cvelistv5
Published
2023-11-09 12:07
Modified
2024-09-04 13:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-552 - Files or Directories Accessible to External Parties
Summary
A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-194: Telit Cinterion (Thales/Gemalto) modules. Files or Directories Accessible to External Parties vulnerability", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:telit_cinterion:bgs5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bgs5", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "bgs5" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:ehs5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ehs5", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "ehs5" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:ehs6:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ehs6", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "ehs6" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:ehs8:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ehs8", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "ehs8" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:pds5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pds5", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "pds5" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:pds6:pds6:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pds6", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "pds6" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:pds8:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pds8", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "pds8" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:els61:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "els61", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "els61" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:els81:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "els81", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "els81" } ] }, { "cpes": [ "cpe:2.3:a:telit_cinterion:pls62:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pls62", "vendor": "telit_cinterion", "versions": [ { "status": "affected", "version": "pls62" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-47612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:32:02.787633Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:47:01.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "BGS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS61", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS81", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PLS62", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552: Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T17:12:52.926Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-194: Telit Cinterion (Thales/Gemalto) modules. Files or Directories Accessible to External Parties vulnerability", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47612", "datePublished": "2023-11-09T12:07:54.815Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-04T13:47:01.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47610 (GCVE-0-2023-47610)
Vulnerability from cvelistv5
Published
2023-11-09 17:05
Modified
2025-02-27 20:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input
Summary
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion EHS5/6/8 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | Telit Cinterion | EHS5 | ||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-23-018: Telit Cinterion (Thales/Gemalto) modules. Buffer Copy without Checking Size of Input vulnerability", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47610", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-26T21:49:12.898675Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:34:06.677Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion EHS5/6/8 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-22T12:20:02.536Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-23-018: Telit Cinterion (Thales/Gemalto) modules. Buffer Copy without Checking Size of Input vulnerability", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/" } ], "timeline": [ { "lang": "en", "time": "2023-08-31T14:30:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-09-22T14:20:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Contact the mobile operator to disable the sending of SMS messages to the device." }, { "lang": "en", "value": "Use private APN with carefully configured security settings to limit impact of any potential exploit. Review the current security configuration in setups that already use private APN." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47610", "datePublished": "2023-11-09T17:05:38.207Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2025-02-27T20:34:06.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47615 (GCVE-0-2023-47615)
Vulnerability from cvelistv5
Published
2023-11-09 12:47
Modified
2024-09-03 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-526 - Exposure of Sensitive Information Through Environmental Variables
Summary
A CWE-526: Exposure of Sensitive Information Through Environmental Variables vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to get access to a sensitive data on the targeted system.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-212: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information Through Environmental Variables", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47615", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T19:33:54.319079Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:34:27.651Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "BGS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS61", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS81", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PLS62", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-526: Exposure of Sensitive Information Through Environmental Variables vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to get access to a sensitive data on the targeted system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-526", "description": "CWE-526: Exposure of Sensitive Information Through Environmental Variables", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T17:18:49.812Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-212: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information Through Environmental Variables", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Enforce application signature verification to prohibit the installation of untrusted MIDlets on the device." }, { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47615", "datePublished": "2023-11-09T12:47:43.253Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-03T19:34:27.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-47616 (GCVE-0-2023-47616)
Vulnerability from cvelistv5
Published
2023-11-09 12:24
Modified
2024-09-03 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:09:37.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "KLCERT-22-193: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information to an Unauthorized Actor", "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47616", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T19:34:03.922305Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:34:41.779Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "BGS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "EHS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS5", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS6", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PDS8", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS61", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "ELS81", "vendor": "Telit Cinterion" }, { "defaultStatus": "affected", "product": "PLS62", "vendor": "Telit Cinterion" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Kozlov from Kaspersky" }, { "lang": "en", "type": "finder", "value": "Sergey Anufrienko from Kaspersky" } ], "descriptions": [ { "lang": "en", "value": "A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T17:20:44.169Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "KLCERT-22-193: Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information to an Unauthorized Actor", "tags": [ "third-party-advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/" } ], "timeline": [ { "lang": "en", "time": "2023-02-21T12:45:00.000Z", "value": "Issue discovered by Kaspersky ICS CERT" }, { "lang": "en", "time": "2023-04-27T15:56:00.000Z", "value": "Confirmed by Telit Cinterion" } ], "workarounds": [ { "lang": "en", "value": "Control physical access to the device at all stages of transportation to protect against the embedding of backdoors." } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2023-47616", "datePublished": "2023-11-09T12:24:33.382Z", "dateReserved": "2023-11-07T10:06:48.689Z", "dateUpdated": "2024-09-03T19:34:41.779Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-11-09 17:15
Modified
2024-11-21 08:30
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion EHS5/6/8 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
telit | bgs5_firmware | - | |
telit | bgs5 | - | |
telit | ehs5_firmware | - | |
telit | ehs5 | - | |
telit | ehs6_firmware | - | |
telit | ehs6 | - | |
telit | ehs8_firmware | - | |
telit | ehs8 | - | |
telit | pds5_firmware | - | |
telit | pds5 | - | |
telit | pds6_firmware | - | |
telit | pds6 | - | |
telit | pds8_firmware | - | |
telit | pds8 | - | |
telit | els61_firmware | - | |
telit | els61 | - | |
telit | els81_firmware | - | |
telit | els81 | - | |
telit | pls62_firmware | - | |
telit | pls62 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A82FB-6772-43F5-BFE5-378A6F740A25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7A300-7A40-49FB-95A3-4F75796A6DB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33F8018-2AA2-4AA2-B97A-FB848F5D1C06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E937F19-944A-4D76-AF25-488FD30FABBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEA2FCCD-752B-4DAB-8353-EF1B35AB143F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*", "matchCriteriaId": "57219468-C424-43D0-98C0-A85A250AB733", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*", "matchCriteriaId": "691F7CF3-B36D-4440-A8A8-A4863FD5E828", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1969DA7-72FC-4981-A3D5-A7919AA5D774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F563DF9-B922-4FCF-8078-EA354F0ED5B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E71C87-3011-43DB-ADB0-A926C7A8E87A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E32F2-2723-43B9-A730-22BCF9D420B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1418767F-34D5-41A0-82BB-BBA7575DD21D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F08EFD2-855A-498D-B88E-59414317BBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B580262-9CF7-4FE4-99E6-F3486A498F10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8E98E9-4BB6-48E5-89ED-420653101A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4647F52-2F3E-45F3-BD84-B54950A06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion EHS5/6/8 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message." }, { "lang": "es", "value": "Existe una vulnerabilidad CWE-120: copia del b\u00fafer sin verificar el tama\u00f1o de la entrada en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podr\u00eda permitir una vulnerabilidad remota no autenticada el atacante ejecute c\u00f3digo arbitrario en el sistema objetivo enviando un mensaje SMS especialmente manipulado." } ], "id": "CVE-2023-47610", "lastModified": "2024-11-21T08:30:31.023", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-09T17:15:08.960", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-09 13:15
Modified
2024-11-21 08:30
Severity ?
2.4 (Low) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
telit | bgs5_firmware | - | |
telit | bgs5 | - | |
telit | ehs5_firmware | - | |
telit | ehs5 | - | |
telit | ehs6_firmware | - | |
telit | ehs6 | - | |
telit | ehs8_firmware | - | |
telit | ehs8 | - | |
telit | pds5_firmware | - | |
telit | pds5 | - | |
telit | pds6_firmware | - | |
telit | pds6 | - | |
telit | pds8_firmware | - | |
telit | pds8 | - | |
telit | els61_firmware | - | |
telit | els61 | - | |
telit | els81_firmware | - | |
telit | els81 | - | |
telit | pls62_firmware | - | |
telit | pls62 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A82FB-6772-43F5-BFE5-378A6F740A25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7A300-7A40-49FB-95A3-4F75796A6DB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33F8018-2AA2-4AA2-B97A-FB848F5D1C06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E937F19-944A-4D76-AF25-488FD30FABBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEA2FCCD-752B-4DAB-8353-EF1B35AB143F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*", "matchCriteriaId": "57219468-C424-43D0-98C0-A85A250AB733", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*", "matchCriteriaId": "691F7CF3-B36D-4440-A8A8-A4863FD5E828", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1969DA7-72FC-4981-A3D5-A7919AA5D774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F563DF9-B922-4FCF-8078-EA354F0ED5B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E71C87-3011-43DB-ADB0-A926C7A8E87A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E32F2-2723-43B9-A730-22BCF9D420B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1418767F-34D5-41A0-82BB-BBA7575DD21D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F08EFD2-855A-498D-B88E-59414317BBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B580262-9CF7-4FE4-99E6-F3486A498F10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8E98E9-4BB6-48E5-89ED-420653101A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4647F52-2F3E-45F3-BD84-B54950A06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system." }, { "lang": "es", "value": "Existe una vulnerabilidad CWE-200: Exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podr\u00eda permitir que un atacante con acceso f\u00edsico al sistema de destino para obtener acceso a datos confidenciales en el sistema de destino." } ], "id": "CVE-2023-47616", "lastModified": "2024-11-21T08:30:31.980", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-09T13:15:07.677", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-09 13:15
Modified
2024-11-21 08:30
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A CWE-526: Exposure of Sensitive Information Through Environmental Variables vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to get access to a sensitive data on the targeted system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
telit | bgs5_firmware | - | |
telit | bgs5 | - | |
telit | ehs5_firmware | - | |
telit | ehs5 | - | |
telit | ehs6_firmware | - | |
telit | ehs6 | - | |
telit | ehs8_firmware | - | |
telit | ehs8 | - | |
telit | pds5_firmware | - | |
telit | pds5 | - | |
telit | pds6_firmware | - | |
telit | pds6 | - | |
telit | pds8_firmware | - | |
telit | pds8 | - | |
telit | els61_firmware | - | |
telit | els61 | - | |
telit | els81_firmware | - | |
telit | els81 | - | |
telit | pls62_firmware | - | |
telit | pls62 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A82FB-6772-43F5-BFE5-378A6F740A25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7A300-7A40-49FB-95A3-4F75796A6DB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33F8018-2AA2-4AA2-B97A-FB848F5D1C06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E937F19-944A-4D76-AF25-488FD30FABBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEA2FCCD-752B-4DAB-8353-EF1B35AB143F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*", "matchCriteriaId": "57219468-C424-43D0-98C0-A85A250AB733", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*", "matchCriteriaId": "691F7CF3-B36D-4440-A8A8-A4863FD5E828", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1969DA7-72FC-4981-A3D5-A7919AA5D774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F563DF9-B922-4FCF-8078-EA354F0ED5B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E71C87-3011-43DB-ADB0-A926C7A8E87A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E32F2-2723-43B9-A730-22BCF9D420B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1418767F-34D5-41A0-82BB-BBA7575DD21D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F08EFD2-855A-498D-B88E-59414317BBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B580262-9CF7-4FE4-99E6-F3486A498F10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8E98E9-4BB6-48E5-89ED-420653101A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4647F52-2F3E-45F3-BD84-B54950A06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-526: Exposure of Sensitive Information Through Environmental Variables vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to get access to a sensitive data on the targeted system." }, { "lang": "es", "value": "Existe una vulnerabilidad CWE-526: Exposici\u00f3n de informaci\u00f3n confidencial a trav\u00e9s de variables ambientales en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podr\u00eda permitir una vulnerabilidad local, un atacante con pocos privilegios para obtener acceso a datos confidenciales en el sistema objetivo." } ], "id": "CVE-2023-47615", "lastModified": "2024-11-21T08:30:31.833", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-09T13:15:07.500", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-526" } ], "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-09 12:15
Modified
2024-11-21 08:30
Severity ?
6.8 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.1 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
6.1 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
telit | bgs5_firmware | - | |
telit | bgs5 | - | |
telit | ehs5_firmware | - | |
telit | ehs5 | - | |
telit | ehs6_firmware | - | |
telit | ehs6 | - | |
telit | ehs8_firmware | - | |
telit | ehs8 | - | |
telit | pds5_firmware | - | |
telit | pds5 | - | |
telit | pds6_firmware | - | |
telit | pds6 | - | |
telit | pds8_firmware | - | |
telit | pds8 | - | |
telit | els61_firmware | - | |
telit | els61 | - | |
telit | els81_firmware | - | |
telit | els81 | - | |
telit | pls62_firmware | - | |
telit | pls62 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A82FB-6772-43F5-BFE5-378A6F740A25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7A300-7A40-49FB-95A3-4F75796A6DB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33F8018-2AA2-4AA2-B97A-FB848F5D1C06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E937F19-944A-4D76-AF25-488FD30FABBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEA2FCCD-752B-4DAB-8353-EF1B35AB143F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*", "matchCriteriaId": "57219468-C424-43D0-98C0-A85A250AB733", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*", "matchCriteriaId": "691F7CF3-B36D-4440-A8A8-A4863FD5E828", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1969DA7-72FC-4981-A3D5-A7919AA5D774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F563DF9-B922-4FCF-8078-EA354F0ED5B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E71C87-3011-43DB-ADB0-A926C7A8E87A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E32F2-2723-43B9-A730-22BCF9D420B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1418767F-34D5-41A0-82BB-BBA7575DD21D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F08EFD2-855A-498D-B88E-59414317BBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B580262-9CF7-4FE4-99E6-F3486A498F10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8E98E9-4BB6-48E5-89ED-420653101A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4647F52-2F3E-45F3-BD84-B54950A06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories." }, { "lang": "es", "value": "Existe una vulnerabilidad CWE-552: Archivos o Directorios Accesibles a Partes Externas en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podr\u00eda permitir que un atacante con acceso f\u00edsico al sistema de destino para obtener acceso de lectura/escritura a cualquier archivo y directorio en el sistema de destino, incluidos archivos y directorios ocultos." } ], "id": "CVE-2023-47612", "lastModified": "2024-11-21T08:30:31.357", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-09T12:15:07.520", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-10 17:15
Modified
2024-11-21 08:30
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A CWE-269: Improper Privilege Management vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to elevate privileges to "manufacturer" level on the targeted system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
telit | bgs5_firmware | - | |
telit | bgs5 | - | |
telit | ehs5_firmware | - | |
telit | ehs5 | - | |
telit | ehs6_firmware | - | |
telit | ehs6 | - | |
telit | ehs8_firmware | - | |
telit | ehs8 | - | |
telit | pds5_firmware | - | |
telit | pds5 | - | |
telit | pds6_firmware | - | |
telit | pds6 | - | |
telit | pds8_firmware | - | |
telit | pds8 | - | |
telit | els61_firmware | - | |
telit | els61 | - | |
telit | els81_firmware | - | |
telit | els81 | - | |
telit | pls62_firmware | - | |
telit | pls62 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A82FB-6772-43F5-BFE5-378A6F740A25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7A300-7A40-49FB-95A3-4F75796A6DB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33F8018-2AA2-4AA2-B97A-FB848F5D1C06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E937F19-944A-4D76-AF25-488FD30FABBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEA2FCCD-752B-4DAB-8353-EF1B35AB143F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*", "matchCriteriaId": "57219468-C424-43D0-98C0-A85A250AB733", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*", "matchCriteriaId": "691F7CF3-B36D-4440-A8A8-A4863FD5E828", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1969DA7-72FC-4981-A3D5-A7919AA5D774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F563DF9-B922-4FCF-8078-EA354F0ED5B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E71C87-3011-43DB-ADB0-A926C7A8E87A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E32F2-2723-43B9-A730-22BCF9D420B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1418767F-34D5-41A0-82BB-BBA7575DD21D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F08EFD2-855A-498D-B88E-59414317BBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B580262-9CF7-4FE4-99E6-F3486A498F10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8E98E9-4BB6-48E5-89ED-420653101A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4647F52-2F3E-45F3-BD84-B54950A06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-269: Improper Privilege Management vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to elevate privileges to \"manufacturer\" level on the targeted system." }, { "lang": "es", "value": "Existe una vulnerabilidad CWE-269: Gesti\u00f3n de Privilegios Inadecuada en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podr\u00eda permitir a un atacante local con pocos privilegios elevar los privilegios al nivel de \"fabricante\" en el sistema de destino." } ], "id": "CVE-2023-47611", "lastModified": "2024-11-21T08:30:31.177", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-10T17:15:07.380", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-10 16:15
Modified
2024-11-21 08:30
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to disclose hidden virtual paths and file names on the targeted system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
telit | bgs5_firmware | - | |
telit | bgs5 | - | |
telit | ehs5_firmware | - | |
telit | ehs5 | - | |
telit | ehs6_firmware | - | |
telit | ehs6 | - | |
telit | ehs8_firmware | - | |
telit | ehs8 | - | |
telit | pds5_firmware | - | |
telit | pds5 | - | |
telit | pds6_firmware | - | |
telit | pds6 | - | |
telit | pds8_firmware | - | |
telit | pds8 | - | |
telit | els61_firmware | - | |
telit | els61 | - | |
telit | els81_firmware | - | |
telit | els81 | - | |
telit | pls62_firmware | - | |
telit | pls62 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A82FB-6772-43F5-BFE5-378A6F740A25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7A300-7A40-49FB-95A3-4F75796A6DB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33F8018-2AA2-4AA2-B97A-FB848F5D1C06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E937F19-944A-4D76-AF25-488FD30FABBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEA2FCCD-752B-4DAB-8353-EF1B35AB143F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*", "matchCriteriaId": "57219468-C424-43D0-98C0-A85A250AB733", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*", "matchCriteriaId": "691F7CF3-B36D-4440-A8A8-A4863FD5E828", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1969DA7-72FC-4981-A3D5-A7919AA5D774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F563DF9-B922-4FCF-8078-EA354F0ED5B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E71C87-3011-43DB-ADB0-A926C7A8E87A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E32F2-2723-43B9-A730-22BCF9D420B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1418767F-34D5-41A0-82BB-BBA7575DD21D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F08EFD2-855A-498D-B88E-59414317BBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B580262-9CF7-4FE4-99E6-F3486A498F10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8E98E9-4BB6-48E5-89ED-420653101A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4647F52-2F3E-45F3-BD84-B54950A06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to disclose hidden virtual paths and file names on the targeted system." }, { "lang": "es", "value": "Existe una vulnerabilidad CWE-200: Exposici\u00f3n de Informaci\u00f3n Confidencial a un Actor No Autorizado en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podr\u00eda permitir una vulnerabilidad local, un atacante con pocos privilegios revela rutas virtuales ocultas y nombres de archivos en el sistema objetivo." } ], "id": "CVE-2023-47614", "lastModified": "2024-11-21T08:30:31.663", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-10T16:15:33.860", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-210-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor-vulnerability/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-210-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor-vulnerability/" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-09 07:15
Modified
2024-11-21 08:30
Severity ?
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Summary
A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
telit | bgs5_firmware | - | |
telit | bgs5 | - | |
telit | ehs5_firmware | - | |
telit | ehs5 | - | |
telit | ehs6_firmware | - | |
telit | ehs6 | - | |
telit | ehs8_firmware | - | |
telit | ehs8 | - | |
telit | pds5_firmware | - | |
telit | pds5 | - | |
telit | pds6_firmware | - | |
telit | pds6 | - | |
telit | pds8_firmware | - | |
telit | pds8 | - | |
telit | els61_firmware | - | |
telit | els61 | - | |
telit | els81_firmware | - | |
telit | els81 | - | |
telit | pls62_firmware | - | |
telit | pls62 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A82FB-6772-43F5-BFE5-378A6F740A25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7A300-7A40-49FB-95A3-4F75796A6DB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33F8018-2AA2-4AA2-B97A-FB848F5D1C06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E937F19-944A-4D76-AF25-488FD30FABBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEA2FCCD-752B-4DAB-8353-EF1B35AB143F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*", "matchCriteriaId": "57219468-C424-43D0-98C0-A85A250AB733", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*", "matchCriteriaId": "691F7CF3-B36D-4440-A8A8-A4863FD5E828", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1969DA7-72FC-4981-A3D5-A7919AA5D774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F563DF9-B922-4FCF-8078-EA354F0ED5B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70E71C87-3011-43DB-ADB0-A926C7A8E87A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6E32F2-2723-43B9-A730-22BCF9D420B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1418767F-34D5-41A0-82BB-BBA7575DD21D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F08EFD2-855A-498D-B88E-59414317BBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B580262-9CF7-4FE4-99E6-F3486A498F10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8E98E9-4BB6-48E5-89ED-420653101A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4647F52-2F3E-45F3-BD84-B54950A06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system." }, { "lang": "es", "value": "Existe una vulnerabilidad CWE-23: Relative Path Traversal en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podr\u00eda permitir a un atacante local con pocos privilegios escape de directorios virtuales y obtenga acceso de lectura/escritura a archivos protegidos en el sistema de destino." } ], "id": "CVE-2023-47613", "lastModified": "2024-11-21T08:30:31.523", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-09T07:15:07.310", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-23" } ], "source": "vulnerability@kaspersky.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }