ID

VAR-202310-0320


CVE

CVE-2023-4215


TITLE

Advantech  Made  WebAccess  information disclosure vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-003824

DESCRIPTION

Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials. Advantech Provided by the company WebAccess The following vulnerabilities exist in. It was * information leak (CWE-200) - CVE-2023-4215If the vulnerability is exploited, it may be affected as follows. It was * When configuring or changing your account information on that device; Cloud Agent Debug User credentials are stolen using the service

Trust: 1.62

sources: NVD: CVE-2023-4215 // JVNDB: JVNDB-2023-003824

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:eqversion:9.1.3

Trust: 1.0

vendor:アドバンテック株式会社model:webaccessscope:eqversion: -

Trust: 0.8

vendor:アドバンテック株式会社model:webaccessscope:eqversion:version 9.1.3

Trust: 0.8

sources: JVNDB: JVNDB-2023-003824 // NVD: CVE-2023-4215

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-4215
value: HIGH

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2023-4215
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2023-003824
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2023-4215
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2023-4215
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2023-003824
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-003824 // NVD: CVE-2023-4215 // NVD: CVE-2023-4215

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-1295

Trust: 1.0

problemtype:information leak (CWE-200) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-003824 // NVD: CVE-2023-4215

PATCH

title:WebAccess/SCADAurl:https://www.advantech.com/en/support/details/installation?id=1-MS9MJV

Trust: 0.8

sources: JVNDB: JVNDB-2023-003824

EXTERNAL IDS

db:NVDid:CVE-2023-4215

Trust: 2.6

db:ICS CERTid:ICSA-23-285-15

Trust: 1.8

db:JVNid:JVNVU93637774

Trust: 0.8

db:JVNDBid:JVNDB-2023-003824

Trust: 0.8

sources: JVNDB: JVNDB-2023-003824 // NVD: CVE-2023-4215

REFERENCES

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-15

Trust: 1.8

url:https://jvn.jp/vu/jvnvu93637774/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-4215

Trust: 0.8

sources: JVNDB: JVNDB-2023-003824 // NVD: CVE-2023-4215

SOURCES

db:JVNDBid:JVNDB-2023-003824
db:NVDid:CVE-2023-4215

LAST UPDATE DATE

2024-10-25T23:34:56.875000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2023-003824date:2024-05-22T07:49:00
db:NVDid:CVE-2023-4215date:2024-10-24T17:15:14.653

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2023-003824date:2023-10-16T00:00:00
db:NVDid:CVE-2023-4215date:2023-10-17T00:15:11.327