CVE-2023-5347 (GCVE-0-2023-5347)
Vulnerability from cvelistv5
Published
2024-01-09 09:54
Modified
2025-06-03 14:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Summary
An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables. This issue affects JetNet devices older than firmware version 2024/01.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Korenix | JetNet Series |
Version: firmware older than 2024/01 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:52:08.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.beijerelectronics.com/en/support/Help___online?docId=69947" }, { "tags": [ "x_transferred" ], "url": "https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/11" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5347", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-08T15:33:17.516940Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-03T14:33:02.608Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "JetNet Series", "vendor": "Korenix", "versions": [ { "status": "affected", "version": "firmware older than 2024/01" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "S. Dietz (CyberDanube)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eThis issue affects JetNet devices older than firmware version 2024/01.\u003c/span\u003e" } ], "value": "An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables.\u00a0This issue affects JetNet devices older than firmware version 2024/01." } ], "impacts": [ { "capecId": "CAPEC-558", "descriptions": [ { "lang": "en", "value": "CAPEC-558 Replace Trusted Executable" } ] }, { "capecId": "CAPEC-552", "descriptions": [ { "lang": "en", "value": "CAPEC-552 Install Rootkit" } ] }, { "capecId": "CAPEC-642", "descriptions": [ { "lang": "en", "value": "CAPEC-642 Replace Binaries" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-15T08:06:18.960Z", "orgId": "7d092a75-6bbd-48c6-a15a-0297458009bc", "shortName": "CyberDanube" }, "references": [ { "url": "https://www.beijerelectronics.com/en/support/Help___online?docId=69947" }, { "url": "https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/" }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/11" }, { "url": "http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Unauthenticated Firmware Upgrade", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "See:\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.beijerelectronics.com/en/support/Help___online?docId=69947\"\u003ehttps://www.beijerelectronics.com/en/support/Help___online?docId=69947\u003c/a\u003e" } ], "value": "See:\u00a0 https://www.beijerelectronics.com/en/support/Help___online?docId=69947 https://www.beijerelectronics.com/en/support/Help___online" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d092a75-6bbd-48c6-a15a-0297458009bc", "assignerShortName": "CyberDanube", "cveId": "CVE-2023-5347", "datePublished": "2024-01-09T09:54:59.664Z", "dateReserved": "2023-10-03T08:11:00.343Z", "dateUpdated": "2025-06-03T14:33:02.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-5347\",\"sourceIdentifier\":\"office@cyberdanube.com\",\"published\":\"2024-01-09T10:15:22.523\",\"lastModified\":\"2024-11-21T08:41:34.967\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables.\u00a0This issue affects JetNet devices older than firmware version 2024/01.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de verificaci\u00f3n incorrecta de la firma criptogr\u00e1fica en el proceso de actualizaci\u00f3n de Korenix JetNet Series permite reemplazar todo el sistema operativo, incluidos los ejecutables confiables. Este problema afecta a los dispositivos JetNet anteriores a la versi\u00f3n de firmware 2024/01.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"office@cyberdanube.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"office@cyberdanube.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_5310g_firmware:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95682DF-7942-49DA-9F81-EF1807045409\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_5310g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A3D8A9-E142-498A-B4E8-B4B197E62F55\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508_firmware:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F0FE3A-6460-46FD-BDC0-40BF2705637D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99147D57-7780-4234-B55D-CC9AFBA481C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508i-w_firmware:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96C77E80-72C3-4662-A9CE-7C8CC126F1B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508i-w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8898260C-6D31-41BA-A2F2-A8975B5C7DEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508-w_firmware:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E017D04-2392-483C-AC36-8AF8F061720B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508-w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAC01082-D54E-4E35-A68C-3CF5A54F2816\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508if-s_firmware:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7461886A-A4D4-4193-8366-5DBB3A78A355\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508if-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAE70B6-7384-4909-8A07-3F786A51EF6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508if-m_firmware:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E97B8A-ABBB-4EE6-9F56-4766FAAA6CBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508if-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044D5792-E5CE-4235-9148-C984AC0F1F6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508if-sw_firmware:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4E5AC4C-E6E6-45A0-9E27-54ABC3D224F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508if-sw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB3742F-CC0B-49E5-B29C-EF4E7D9A7D28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508if-mw_firmware:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EBBC44-1C71-406C-9FF0-39FB493C5931\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508if-mw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"701A8011-7DA5-417F-B36F-ABED3914DED6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508f-m_firmware:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7361627A-4F68-413D-8051-5C3318DD8F51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508f-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A20FF6-2622-4FD4-939C-587B48DD8933\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508f-s_firmware:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B14120-454F-4D1D-A156-1506DD0C0037\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508f-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4637E3CC-6474-419C-A78C-963C77AEFF51\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508f-mw_firmware:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F5BD0F-74C3-4032-A6CC-90A96EBAA14C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508f-mw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7E5326F-3E4F-40EB-946F-A4D6EA71E9B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_4508f-sw_firmware:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C41FA7-2DD7-4788-9874-67ACCADDD456\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_4508f-sw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EDFA438-A071-445B-86B9-44C22DB7664D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_5620g-4c_firmware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D9FE392-DF90-4837-9B96-6CC3ADE539CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_5620g-4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9385192-A75A-428E-9A04-E443A69B2DF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_5612gp-4f_firmware:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64BD0899-AA5B-43DA-B741-BC74CF522989\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_5612gp-4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1097E748-4ACA-4D97-8000-A219D0771B2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_5612g-4f_firmware:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B76261-DAD3-43C9-AAB1-ED30C825A3AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_5612g-4f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D7393F-8736-4BC7-A611-4E54D14F7893\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_5728g-24p-ac-2dc-us_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB3C066-DA69-4C69-ACD1-8AA325667B25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_5728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F24671-F7E7-476E-92CD-CF0061682A6A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_5728g-24p-ac-2dc-eu_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E34410B0-C4D5-40B9-89A8-95782A55913E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_5728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9145BCF4-E8A0-4561-B5D3-B79B8BDD8692\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6528gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"347A53EC-7C44-46C4-ABAF-CF7AD709B0AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6528gf-2ac-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1189AAB8-CFB1-4542-A85D-717E793F67F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6528gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9D7474-2DC1-4698-8116-506E05A87E0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6528gf-2ac-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B857CDA-1A39-454E-B16C-CE90CD1577B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6528gf-2dc24_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47FED1A9-830B-4F3D-92C7-5CAEF5F742C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6528gf-2dc24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEAAB531-DB65-4C51-A2FC-9D7E6FBBCB23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6528gf-2dc48_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F06A64-36CA-4023-8217-1ECC065AFC13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6528gf-2dc48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"165844C8-B773-49D1-AFFB-564EE4858127\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6528gf-ac-eu_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DB9A900-9AC7-4A82-BEED-7002AD81AFDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6528gf-ac-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69857D1C-BA45-4B3F-8F11-9D5636EDFF5D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6528gf-ac-us_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE95314D-9AFC-40CB-B449-B195FF94605B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6528gf-ac-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B483B168-203E-4905-9585-B7DDC735A76E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C890BEF3-785C-47F1-A65C-92518E4FAA2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6628xp-4f-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A1FA23F-3E4E-46E5-A0F8-B31895C1B5CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70128CE4-FAF6-4564-BC3F-EFA813A01DD4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6628x-4f-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAC14B48-37CE-4385-A779-A553850A7B3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6728g-24p-ac-2dc-us_firmware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E4FFB2-CB4C-4088-A656-84B7F883DF6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6728g-24p-ac-2dc-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D865328-72DC-4802-A82D-DBF30B638583\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6728g-24p-ac-2dc-eu_firmware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C837607-C6FF-40F2-AC88-6A9C48CB1029\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6728g-24p-ac-2dc-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16305FB2-E46A-4DDA-9E85-64DAD64B35D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6828gf-2dc48_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43816A78-45C6-4829-A4C4-72DA8E0E330C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6828gf-2dc48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38E8437F-8F81-40D5-A4A2-D6D3D1E8DC7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6828gf-2dc24_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B733CE0-84AC-4E80-9276-F129F41DF88E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6828gf-2dc24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58C8D47C-A56B-43A2-9A85-4C5823A3B9A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6828gf-ac-dc24-us_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1ADD38-C9C3-42AE-AD9A-D20FE64F44D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6828gf-ac-dc24-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51811483-40D1-40B9-82CB-015CEA7A8ACE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6828gf-2ac-us_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC888A2-32AC-4DB0-B073-FE8FE9A565CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6828gf-2ac-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BC55D-9ED9-4A22-AFED-9C199A89011F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6828gf-ac-us_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"527AFFFB-0626-41AD-9CD8-0E34ECC4B4A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6828gf-ac-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AA11034-5A43-45C5-A48A-B9754A63AFBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6828gf-2ac-au_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2B07B4D-6E13-4589-8ACA-ADF728EB4716\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6828gf-2ac-au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1523A9A-09E0-44E1-96E2-24FE49B7FDAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6828gf-ac-dc24-eu_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E718E1-864B-4B97-8A4C-242E449728A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6828gf-ac-dc24-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C64F5C7-7FC0-415A-8209-145DA3A296FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6828gf-2ac-eu_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C26FCFA8-C978-4967-82CC-7CEBEC9014B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6828gf-2ac-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73431E6E-CAF5-4114-A2E8-BE9860558610\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_6910g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65334CFA-6C17-461E-9137-976244486B42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_6910g-m12_hvdc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1D90718-B60B-4950-9898-24E315D63F44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_7310g-v2_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC7EFE2-DE02-4012-955B-5078348B362C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_7310g-v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53CE00D4-6846-4C28-83DD-13952831275E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_7628xp-4f-us_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C417B424-3504-4BFB-AFB9-B66C0AF38AD5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_7628xp-4f-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E629B201-717C-4D7C-A1DE-04E0820B7AA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_7628xp-4f-us_firmware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B817CA4-30DC-419D-AD84-3489CA0C68D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_7628xp-4f-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E629B201-717C-4D7C-A1DE-04E0820B7AA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_7628xp-4f-eu_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE668B76-D528-4C4F-93CC-893479E2230C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_7628xp-4f-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B566F22-B0BA-4259-B104-AFCEA5ECCA70\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_7628xp-4f-eu_firmware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B8862C-DA86-46DD-957A-7B88C6C42927\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_7628xp-4f-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B566F22-B0BA-4259-B104-AFCEA5ECCA70\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_7628x-4f-us_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3563599-3CF7-46ED-8734-0A52BA052071\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_7628x-4f-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C722303-26DB-44AD-BF0D-A7930C52A638\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_7628x-4f-eu_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB06B11C-154D-4B6A-8E8E-A12831F8211E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_7628x-4f-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41AF8048-A100-4BDB-B902-B80E70D89173\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:korenix:jetnet_7714g-m12_hvdc_firmware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6624B567-4DF0-4A67-8C14-EB8E4BE1EEDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:korenix:jetnet_7714g-m12_hvdc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0492BC5-5B2C-4DF7-971C-679955DE83AC\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html\",\"source\":\"office@cyberdanube.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2024/Jan/11\",\"source\":\"office@cyberdanube.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/\",\"source\":\"office@cyberdanube.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.beijerelectronics.com/en/support/Help___online?docId=69947\",\"source\":\"office@cyberdanube.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2024/Jan/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.beijerelectronics.com/en/support/Help___online?docId=69947\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.beijerelectronics.com/en/support/Help___online?docId=69947\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2024/Jan/11\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T07:52:08.584Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-5347\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-08T15:33:17.516940Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-08T15:33:19.190Z\"}}], \"cna\": {\"title\": \"Unauthenticated Firmware Upgrade\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"S. Dietz (CyberDanube)\"}], \"impacts\": [{\"capecId\": \"CAPEC-558\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-558 Replace Trusted Executable\"}]}, {\"capecId\": \"CAPEC-552\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-552 Install Rootkit\"}]}, {\"capecId\": \"CAPEC-642\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-642 Replace Binaries\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Korenix\", \"product\": \"JetNet Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"firmware older than 2024/01\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://www.beijerelectronics.com/en/support/Help___online?docId=69947\"}, {\"url\": \"https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/\"}, {\"url\": \"http://seclists.org/fulldisclosure/2024/Jan/11\"}, {\"url\": \"http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"See:\\u00a0 https://www.beijerelectronics.com/en/support/Help___online?docId=69947 https://www.beijerelectronics.com/en/support/Help___online\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"See:\u0026nbsp;\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.beijerelectronics.com/en/support/Help___online?docId=69947\\\"\u003ehttps://www.beijerelectronics.com/en/support/Help___online?docId=69947\u003c/a\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables.\\u00a0This issue affects JetNet devices older than firmware version 2024/01.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables.\u0026nbsp;\u003cspan style=\\\"background-color: var(--wht);\\\"\u003eThis issue affects JetNet devices older than firmware version 2024/01.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-347\", \"description\": \"CWE-347 Improper Verification of Cryptographic Signature\"}]}], \"providerMetadata\": {\"orgId\": \"7d092a75-6bbd-48c6-a15a-0297458009bc\", \"shortName\": \"CyberDanube\", \"dateUpdated\": \"2024-01-15T08:06:18.960Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-5347\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-03T14:33:02.608Z\", \"dateReserved\": \"2023-10-03T08:11:00.343Z\", \"assignerOrgId\": \"7d092a75-6bbd-48c6-a15a-0297458009bc\", \"datePublished\": \"2024-01-09T09:54:59.664Z\", \"assignerShortName\": \"CyberDanube\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…