ID

VAR-202309-0494


CVE

CVE-2023-39238


TITLE

plural  ASUSTeK Computer Inc.  Product Format String Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-011977

DESCRIPTION

It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-39238 // JVNDB: JVNDB-2023-011977 // VULMON: CVE-2023-39238

AFFECTED PRODUCTS

vendor:asusmodel:rt-ax56u v2scope:eqversion:3.0.0.4.386_50460

Trust: 1.0

vendor:asusmodel:rt-ax55scope:eqversion:3.0.0.4.386_50460

Trust: 1.0

vendor:asusmodel:rt-ac86uscope:eqversion:3.0.0.4_386_51529

Trust: 1.0

vendor:asustek computermodel:rt-ac86uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:rt-ax55scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rt-ax56u v2scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-011977 // NVD: CVE-2023-39238

CVSS

SEVERITY

CVSSV2

CVSSV3

twcert@cert.org.tw: CVE-2023-39238
value: HIGH

Trust: 1.0

OTHER: JVNDB-2023-011977
value: HIGH

Trust: 0.8

twcert@cert.org.tw: CVE-2023-39238
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2023-011977
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-011977 // NVD: CVE-2023-39238

PROBLEMTYPE DATA

problemtype:CWE-134

Trust: 1.0

problemtype:Format string problem (CWE-134) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-011977 // NVD: CVE-2023-39238

EXTERNAL IDS

db:NVDid:CVE-2023-39238

Trust: 2.7

db:JVNDBid:JVNDB-2023-011977

Trust: 0.8

db:VULMONid:CVE-2023-39238

Trust: 0.1

sources: VULMON: CVE-2023-39238 // JVNDB: JVNDB-2023-011977 // NVD: CVE-2023-39238

REFERENCES

url:https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2023-39238

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/134.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-39238 // JVNDB: JVNDB-2023-011977 // NVD: CVE-2023-39238

SOURCES

db:VULMONid:CVE-2023-39238
db:JVNDBid:JVNDB-2023-011977
db:NVDid:CVE-2023-39238

LAST UPDATE DATE

2024-08-14T15:36:46.328000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-39238date:2023-09-07T00:00:00
db:JVNDBid:JVNDB-2023-011977date:2024-05-31T05:28:00
db:NVDid:CVE-2023-39238date:2024-03-27T07:15:47.557

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-39238date:2023-09-07T00:00:00
db:JVNDBid:JVNDB-2023-011977date:2023-12-15T00:00:00
db:NVDid:CVE-2023-39238date:2023-09-07T08:15:07.533