Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-4465", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "state": "PUBLISHED", "assignerShortName": "VulDB", "dateReserved": "2023-08-21T17:03:52.457Z", "datePublished": "2023-12-29T09:37:59.607Z", "dateUpdated": "2024-08-02T07:31:05.490Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB", "dateUpdated": "2024-01-09T16:16:20.765Z"}, "title": "Poly VVX 601 Configuration File Import unverified password change", "problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-620", "lang": "en", "description": "CWE-620 Unverified Password Change"}]}], "affected": [{"vendor": "Poly", "product": "Trio 8300", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "Trio 8500", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "Trio 8800", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "Trio C60", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "CCX 350", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "CCX 400", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "CCX 500", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "CCX 505", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "CCX 600", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "CCX 700", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E100", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E220", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E300", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E320", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E350", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E400", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E450", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E500", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "EDGE E550", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 101", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 150", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 201", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 250", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 300", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 301", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 310", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 311", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 350", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 400", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 401", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 410", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 411", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 450", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 500", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 501", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 600", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}, {"vendor": "Poly", "product": "VVX 601", "versions": [{"version": "n/a", "status": "affected"}], "modules": ["Configuration File Import"]}], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Poly Trio 8300, Trio 8500, Trio 8800, Trio C60, CCX 350, CCX 400, CCX 500, CCX 505, CCX 600, CCX 700, EDGE E100, EDGE E220, EDGE E300, EDGE E320, EDGE E350, EDGE E400, EDGE E450, EDGE E500, EDGE E550, VVX 101, VVX 150, VVX 201, VVX 250, VVX 300, VVX 301, VVX 310, VVX 311, VVX 350, VVX 400, VVX 401, VVX 410, VVX 411, VVX 450, VVX 500, VVX 501, VVX 600 and VVX 601. Affected is an unknown function of the component Configuration File Import. The manipulation of the argument device.auth.localAdminPassword leads to unverified password change. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249258 is the identifier assigned to this vulnerability."}, {"lang": "de", "value": "Es wurde eine Schwachstelle in Poly Trio 8300, Trio 8500, Trio 8800, Trio C60, CCX 350, CCX 400, CCX 500, CCX 505, CCX 600, CCX 700, EDGE E100, EDGE E220, EDGE E300, EDGE E320, EDGE E350, EDGE E400, EDGE E450, EDGE E500, EDGE E550, VVX 101, VVX 150, VVX 201, VVX 250, VVX 300, VVX 301, VVX 310, VVX 311, VVX 350, VVX 400, VVX 401, VVX 410, VVX 411, VVX 450, VVX 500, VVX 501, VVX 600 and VVX 601 gefunden. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Komponente Configuration File Import. Durch das Beeinflussen des Arguments device.auth.localAdminPassword mit unbekannten Daten kann eine unverified password change-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."}], "metrics": [{"cvssV3_1": {"version": "3.1", "baseScore": 2.7, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "baseSeverity": "LOW"}}, {"cvssV3_0": {"version": "3.0", "baseScore": 2.7, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "baseSeverity": "LOW"}}, {"cvssV2_0": {"version": "2.0", "baseScore": 3.3, "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N"}}], "timeline": [{"time": "2023-12-29T00:00:00.000Z", "lang": "en", "value": "Advisory disclosed"}, {"time": "2023-12-29T01:00:00.000Z", "lang": "en", "value": "VulDB entry created"}, {"time": "2024-01-09T17:20:00.000Z", "lang": "en", "value": "VulDB entry last update"}], "credits": [{"lang": "en", "value": "Christoph Wolff", "type": "finder"}, {"lang": "en", "value": "Pascal Zenker", "type": "finder"}], "references": [{"url": "https://vuldb.com/?id.249258", "tags": ["vdb-entry", "technical-description"]}, {"url": "https://vuldb.com/?ctiid.249258", "tags": ["signature", "permissions-required"]}, {"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip/", "tags": ["related"]}, {"url": "https://support.hp.com/us-en/document/ish_9929371-9929407-16/hpsbpy03899", "tags": ["related"]}, {"url": "https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices", "tags": ["exploit"]}, {"url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html", "tags": ["related"]}]}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T07:31:05.490Z"}, "title": "CVE Program Container", "references": [{"url": "https://vuldb.com/?id.249258", "tags": ["vdb-entry", "technical-description", "x_transferred"]}, {"url": "https://vuldb.com/?ctiid.249258", "tags": ["signature", "permissions-required", "x_transferred"]}, {"url": "https://modzero.com/en/advisories/mz-23-01-poly-voip/", "tags": ["related", "x_transferred"]}, {"url": "https://support.hp.com/us-en/document/ish_9929371-9929407-16/hpsbpy03899", "tags": ["related", "x_transferred"]}, {"url": "https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices", "tags": ["exploit", "x_transferred"]}, {"url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html", "tags": ["related", "x_transferred"]}]}]}}