Incorrect access control in logs management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote attackers to get the device logs via HTTP GET request. The logs contain such information as user names and IP addresses used in the infrastructure. This information may help the attackers to conduct further attacks in the infrastructure.
References
History

Thu, 07 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Aten
Aten pe6208 Firmware
Weaknesses CWE-862
CPEs cpe:2.3:o:aten:pe6208_firmware:2.3.228:*:*:*:*:*:*:*
cpe:2.3:o:aten:pe6208_firmware:2.4.232:*:*:*:*:*:*:*
Vendors & Products Aten
Aten pe6208 Firmware
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-11-07T14:51:43.351Z

Reserved:

Link: CVE-2023-43846

cve-icon Vulnrichment

Updated: 2024-08-02T19:52:11.313Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-28T19:15:09.463

Modified: 2024-11-21T08:24:53.053

Link: CVE-2023-43846

cve-icon Redhat

No data.