The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information

Project Subscriptions

Vendors Products
Dataprobe Subscribe
Iboot-pdu4-c20 Subscribe
Iboot-pdu4-c20 Firmware Subscribe
Iboot-pdu4-n20 Subscribe
Iboot-pdu4-n20 Firmware Subscribe
Iboot-pdu4a-c10 Subscribe
Iboot-pdu4a-c10 Firmware Subscribe
Iboot-pdu4a-c20 Subscribe
Iboot-pdu4a-c20 Firmware Subscribe
Iboot-pdu4a-n15 Subscribe
Iboot-pdu4a-n15 Firmware Subscribe
Iboot-pdu4a-n20 Subscribe
Iboot-pdu4a-n20 Firmware Subscribe
Iboot-pdu4sa-c10 Subscribe
Iboot-pdu4sa-c10 Firmware Subscribe
Iboot-pdu4sa-c20 Subscribe
Iboot-pdu4sa-c20 Firmware Subscribe
Iboot-pdu4sa-n15 Subscribe
Iboot-pdu4sa-n15 Firmware Subscribe
Iboot-pdu4sa-n20 Subscribe
Iboot-pdu4sa-n20 Firmware Subscribe
Iboot-pdu8a-2c10 Subscribe
Iboot-pdu8a-2c10 Firmware Subscribe
Iboot-pdu8a-2c20 Subscribe
Iboot-pdu8a-2c20 Firmware Subscribe
Iboot-pdu8a-2n15 Subscribe
Iboot-pdu8a-2n15 Firmware Subscribe
Iboot-pdu8a-2n20 Subscribe
Iboot-pdu8a-2n20 Firmware Subscribe
Iboot-pdu8a-c10 Subscribe
Iboot-pdu8a-c10 Firmware Subscribe
Iboot-pdu8a-c20 Subscribe
Iboot-pdu8a-c20 Firmware Subscribe
Iboot-pdu8a-n15 Subscribe
Iboot-pdu8a-n15 Firmware Subscribe
Iboot-pdu8a-n20 Subscribe
Iboot-pdu8a-n20 Firmware Subscribe
Iboot-pdu8sa-2n15 Subscribe
Iboot-pdu8sa-2n15 Firmware Subscribe
Iboot-pdu8sa-c10 Subscribe
Iboot-pdu8sa-c10 Firmware Subscribe
Iboot-pdu8sa-n15 Subscribe
Iboot-pdu8sa-n15 Firmware Subscribe
Iboot-pdu8sa-n20 Subscribe
Iboot-pdu8sa-n20 Firmware Subscribe
Iboot Pdu Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-43935 The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 09 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Dataprobe iboot Pdu
CPEs cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:*
Vendors & Products Dataprobe iboot Pdu
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-10-09T13:30:19.348Z

Reserved: 2023-06-15T06:48:44.547Z

Link: CVE-2023-3259

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:08.289Z

cve-icon NVD

Status : Modified

Published: 2023-08-14T04:15:10.417

Modified: 2024-11-21T08:16:48.917

Link: CVE-2023-3259

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses