ID

VAR-202309-0562


CVE

CVE-2023-39240


TITLE

plural  ASUSTeK Computer Inc.  Product Format String Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-011975

DESCRIPTION

It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-39240 // JVNDB: JVNDB-2023-011975 // VULMON: CVE-2023-39240

AFFECTED PRODUCTS

vendor:asusmodel:rt-ax56u v2scope:eqversion:3.0.0.4.386_50460

Trust: 1.0

vendor:asusmodel:rt-ax55scope:eqversion:3.0.0.4.386_50460

Trust: 1.0

vendor:asusmodel:rt-ac86uscope:eqversion:3.0.0.4_386_51529

Trust: 1.0

vendor:asustek computermodel:rt-ac86uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:rt-ax55scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rt-ax56u v2scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-011975 // NVD: CVE-2023-39240

CVSS

SEVERITY

CVSSV2

CVSSV3

twcert@cert.org.tw: CVE-2023-39240
value: HIGH

Trust: 1.0

OTHER: JVNDB-2023-011975
value: HIGH

Trust: 0.8

twcert@cert.org.tw: CVE-2023-39240
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2023-011975
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-011975 // NVD: CVE-2023-39240

PROBLEMTYPE DATA

problemtype:CWE-134

Trust: 1.0

problemtype:Format string problem (CWE-134) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-011975 // NVD: CVE-2023-39240

EXTERNAL IDS

db:NVDid:CVE-2023-39240

Trust: 2.7

db:JVNDBid:JVNDB-2023-011975

Trust: 0.8

db:VULMONid:CVE-2023-39240

Trust: 0.1

sources: VULMON: CVE-2023-39240 // JVNDB: JVNDB-2023-011975 // NVD: CVE-2023-39240

REFERENCES

url:https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2023-39240

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/134.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-39240 // JVNDB: JVNDB-2023-011975 // NVD: CVE-2023-39240

SOURCES

db:VULMONid:CVE-2023-39240
db:JVNDBid:JVNDB-2023-011975
db:NVDid:CVE-2023-39240

LAST UPDATE DATE

2024-08-14T14:48:52.191000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-39240date:2023-09-07T00:00:00
db:JVNDBid:JVNDB-2023-011975date:2024-05-31T05:30:00
db:NVDid:CVE-2023-39240date:2024-03-27T07:15:48.047

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-39240date:2023-09-07T00:00:00
db:JVNDBid:JVNDB-2023-011975date:2023-12-15T00:00:00
db:NVDid:CVE-2023-39240date:2023-09-07T08:15:07.710