ID

VAR-202309-0437


CVE

CVE-2023-39239


TITLE

plural  ASUSTeK Computer Inc.  Product Format String Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-011976

DESCRIPTION

It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-39239 // JVNDB: JVNDB-2023-011976 // VULMON: CVE-2023-39239

AFFECTED PRODUCTS

vendor:asusmodel:rt-ax56u v2scope:eqversion:3.0.0.4.386_50460

Trust: 1.0

vendor:asusmodel:rt-ax55scope:eqversion:3.0.0.4.386_50460

Trust: 1.0

vendor:asusmodel:rt-ac86uscope:eqversion:3.0.0.4_386_51529

Trust: 1.0

vendor:asustek computermodel:rt-ac86uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:rt-ax55scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rt-ax56u v2scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-011976 // NVD: CVE-2023-39239

CVSS

SEVERITY

CVSSV2

CVSSV3

twcert@cert.org.tw: CVE-2023-39239
value: HIGH

Trust: 1.0

OTHER: JVNDB-2023-011976
value: HIGH

Trust: 0.8

twcert@cert.org.tw: CVE-2023-39239
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2023-011976
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-011976 // NVD: CVE-2023-39239

PROBLEMTYPE DATA

problemtype:CWE-134

Trust: 1.0

problemtype:Format string problem (CWE-134) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-011976 // NVD: CVE-2023-39239

EXTERNAL IDS

db:NVDid:CVE-2023-39239

Trust: 2.7

db:JVNDBid:JVNDB-2023-011976

Trust: 0.8

db:VULMONid:CVE-2023-39239

Trust: 0.1

sources: VULMON: CVE-2023-39239 // JVNDB: JVNDB-2023-011976 // NVD: CVE-2023-39239

REFERENCES

url:https://https://www.twcert.org.tw/tw/cp-132-7355-0ce8d-1.html

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-39239

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/134.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-39239 // JVNDB: JVNDB-2023-011976 // NVD: CVE-2023-39239

SOURCES

db:VULMONid:CVE-2023-39239
db:JVNDBid:JVNDB-2023-011976
db:NVDid:CVE-2023-39239

LAST UPDATE DATE

2024-08-14T14:36:37.090000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-39239date:2023-09-07T00:00:00
db:JVNDBid:JVNDB-2023-011976date:2024-05-31T05:32:00
db:NVDid:CVE-2023-39239date:2024-03-27T08:15:37.867

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-39239date:2023-09-07T00:00:00
db:JVNDBid:JVNDB-2023-011976date:2023-12-15T00:00:00
db:NVDid:CVE-2023-39239date:2023-09-07T08:15:07.620