Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"state": "PUBLISHED", "cveId": "CVE-2023-36483", "assignerOrgId": "e24e6442-3ae1-4538-a7b8-7ac95586db8f", "assignerShortName": "Carrier", "dateUpdated": "2024-08-28T16:23:17.832Z", "dateReserved": "2023-06-22T00:00:00", "datePublished": "2024-03-16T00:00:00"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "platforms": ["Android"], "product": "MASmobile Classic", "vendor": "MAS (a Carrier brand)", "versions": [{"lessThanOrEqual": "1.16.18", "status": "affected", "version": "1", "versionType": "custom"}]}, {"defaultStatus": "unaffected", "platforms": ["iOS"], "product": "MASmobile Classic", "vendor": "MAS (a Carrier brand)", "versions": [{"lessThanOrEqual": "1.7.24", "status": "affected", "version": "1", "versionType": "custom"}]}, {"defaultStatus": "unaffected", "product": "MAS ASP.Net Services", "vendor": "MAS (a Carrier brand)", "versions": [{"lessThanOrEqual": "1.9", "status": "affected", "version": "1", "versionType": "custom"}]}], "credits": [{"lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Joris Talma, independent .NET developer from The Netherlands, reported this vulnerability to Carrier."}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android version 1.16.18 and earlier and \n\nMASmobile Classic iOS version 1.7.24 and earlier\n\nwhich allows remote attackers to retrieve sensitive data including customer data, security system status, and event history.<br>"}], "value": "Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android\u00a0 version 1.16.18 and earlier and \n\nMASmobile Classic iOS version 1.7.24 and earlier\n\nwhich allows remote attackers to retrieve sensitive data\u00a0 including customer data, security system status, and event history.\n"}], "impacts": [{"capecId": "CAPEC-59", "descriptions": [{"lang": "en", "value": "CAPEC-59 Session Credential Falsification through Prediction"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-639", "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "e24e6442-3ae1-4538-a7b8-7ac95586db8f", "shortName": "Carrier", "dateUpdated": "2024-03-21T21:23:21.767Z"}, "references": [{"url": "https://www.corporate.carrier.com/product-security/advisories-resources/"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory. To uninstall, unpublish the services in IIS and remove the service files. All versions (v1.7, 1.8, and 1.9) were discontinued.<br>2. Remove the MASmobile Classic app from Android and iOS devices. All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore).<br>3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later). These services do not run under IIS and must be configured in coordination with the customer.<br>4. Install MASmobile app from Play or AppStore (v2.x.x). This is not an upgrade to MASmobile Classic; it is a different app."}], "value": "1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory. To uninstall, unpublish the services in IIS and remove the service files. All versions (v1.7, 1.8, and 1.9) were discontinued.\n2. Remove the MASmobile Classic app from Android and iOS devices. All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore).\n3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later). These services do not run under IIS and must be configured in coordination with the customer.\n4. Install MASmobile app from Play or AppStore (v2.x.x). This is not an upgrade to MASmobile Classic; it is a different app."}], "source": {"discovery": "UNKNOWN"}, "title": "MAS (a Carrier brand) MASmobile Classic Authorization Bypass", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T16:45:57.162Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.corporate.carrier.com/product-security/advisories-resources/", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "carrier", "product": "masmobile_classic", "cpes": ["cpe:2.3:a:carrier:masmobile_classic:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "1", "status": "affected", "lessThanOrEqual": "1.16.18", "versionType": "custom"}, {"version": "1", "status": "affected", "lessThanOrEqual": "1.7.24", "versionType": "custom"}]}, {"vendor": "carrier", "product": "mas_asp.net_services", "cpes": ["cpe:2.3:a:carrier:mas_asp.net_services:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "1", "status": "affected", "lessThanOrEqual": "1.9", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-03-18T15:09:34.432630Z", "id": "CVE-2023-36483", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-28T16:23:17.832Z"}}]}}