The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information
Metrics
Affected Vendors & Products
References
History
Wed, 09 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dataprobe iboot Pdu
|
|
CPEs | cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:* | |
Vendors & Products |
Dataprobe iboot Pdu
|
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: trellix
Published: 2023-08-14T03:49:59.889Z
Updated: 2024-10-09T13:30:19.348Z
Reserved: 2023-06-15T06:48:44.547Z
Link: CVE-2023-3259
Vulnrichment
Updated: 2024-08-02T06:48:08.289Z
NVD
Status : Modified
Published: 2023-08-14T04:15:10.417
Modified: 2024-11-21T08:16:48.917
Link: CVE-2023-3259
Redhat
No data.