Due to improper restriction, authenticated attackers could retrieve and read system files of the underlying server through the XML interface. The information that can be read can lead to a full system compromise.
History

Wed, 16 Oct 2024 12:00:00 +0000

Type Values Removed Values Added
Description Due to improper restriction, attackers could retrieve and read system files of the underlying server through the XML interface. Due to improper restriction, authenticated attackers could retrieve and read system files of the underlying server through the XML interface. The information that can be read can lead to a full system compromise.
Title Path Traversal in Danfoss AK-SM800A Authneticated Path Traversal in Danfoss AK-SM800A
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 07 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: DIVD

Published: 2023-08-21T20:30:03.122Z

Updated: 2024-10-16T11:52:22.354Z

Reserved: 2023-02-16T14:22:41.966Z

Link: CVE-2023-25914

cve-icon Vulnrichment

Updated: 2024-08-02T11:32:12.736Z

cve-icon NVD

Status : Modified

Published: 2023-08-21T21:15:08.970

Modified: 2024-11-21T07:50:25.230

Link: CVE-2023-25914

cve-icon Redhat

No data.