CVE-2023-2376
Published Apr 28, 2023
Last updated 6 months ago
Overview
- Description
- A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been classified as critical. Affected is an unknown function of the component Web Management Interface. The manipulation of the argument dpi leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227652.
- Source
- cna@vuldb.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- cna@vuldb.com
- CWE-77
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ui:er-x_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E5C7E0B-4335-44F0-A19F-6E68D9CFD5AF", "versionEndExcluding": "2.0.9" }, { "criteria": "cpe:2.3:o:ui:er-x_firmware:2.0.9:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DB3EE14-A555-4DCA-9C16-F3D72489F10C" }, { "criteria": "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2844D28C-FAD9-498A-93FF-7A4A217210A8" }, { "criteria": "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF7E7155-EFDC-42E0-A851-8FD2C58A2076" }, { "criteria": "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0473F8F-8D1E-4CEB-A7FC-979F3F3AAF29" }, { "criteria": "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5D34B1D-9F1F-4A1F-A76C-FB4EE83D08F7" }, { "criteria": "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93A4BC03-E96D-42A9-9034-7017DA6EA389" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ui:er-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "91B9AD72-BF39-4731-85B9-26036F7C425B" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ui:er-x-sfp_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34DA36D8-F0BD-4E98-A74C-5D50AD0980C5", "versionEndExcluding": "2.0.9" }, { "criteria": "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "906F4A72-7C6D-45FD-875F-2D2791CE9F4A" }, { "criteria": "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B919E33F-AC70-432C-A3F8-29FDFC710BB0" }, { "criteria": "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4191452-071A-4BF1-B312-C4F9C28A5205" }, { "criteria": "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFEE96EB-D8AE-4B23-B090-E86FBA4BEF73" }, { "criteria": "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "101616F2-CA1A-4BF0-9025-F20EDA26F235" }, { "criteria": "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47ABA9C8-67E4-4DE2-822A-3E17639F745E" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:ui:er-x-sfp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4F922D6E-7C6D-4984-A0DF-6EDC0C7A9900" } ], "operator": "OR" } ], "operator": "AND" } ]