The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information
Project Subscriptions
| Vendors | Products |
|---|---|
|
Dataprobe
Subscribe
|
Iboot-pdu4-c20
Subscribe
Iboot-pdu4-c20 Firmware
Subscribe
Iboot-pdu4-n20
Subscribe
Iboot-pdu4-n20 Firmware
Subscribe
Iboot-pdu4a-c10
Subscribe
Iboot-pdu4a-c10 Firmware
Subscribe
Iboot-pdu4a-c20
Subscribe
Iboot-pdu4a-c20 Firmware
Subscribe
Iboot-pdu4a-n15
Subscribe
Iboot-pdu4a-n15 Firmware
Subscribe
Iboot-pdu4a-n20
Subscribe
Iboot-pdu4a-n20 Firmware
Subscribe
Iboot-pdu4sa-c10
Subscribe
Iboot-pdu4sa-c10 Firmware
Subscribe
Iboot-pdu4sa-c20
Subscribe
Iboot-pdu4sa-c20 Firmware
Subscribe
Iboot-pdu4sa-n15
Subscribe
Iboot-pdu4sa-n15 Firmware
Subscribe
Iboot-pdu4sa-n20
Subscribe
Iboot-pdu4sa-n20 Firmware
Subscribe
Iboot-pdu8a-2c10
Subscribe
Iboot-pdu8a-2c10 Firmware
Subscribe
Iboot-pdu8a-2c20
Subscribe
Iboot-pdu8a-2c20 Firmware
Subscribe
Iboot-pdu8a-2n15
Subscribe
Iboot-pdu8a-2n15 Firmware
Subscribe
Iboot-pdu8a-2n20
Subscribe
Iboot-pdu8a-2n20 Firmware
Subscribe
Iboot-pdu8a-c10
Subscribe
Iboot-pdu8a-c10 Firmware
Subscribe
Iboot-pdu8a-c20
Subscribe
Iboot-pdu8a-c20 Firmware
Subscribe
Iboot-pdu8a-n15
Subscribe
Iboot-pdu8a-n15 Firmware
Subscribe
Iboot-pdu8a-n20
Subscribe
Iboot-pdu8a-n20 Firmware
Subscribe
Iboot-pdu8sa-2n15
Subscribe
Iboot-pdu8sa-2n15 Firmware
Subscribe
Iboot-pdu8sa-c10
Subscribe
Iboot-pdu8sa-c10 Firmware
Subscribe
Iboot-pdu8sa-n15
Subscribe
Iboot-pdu8sa-n15 Firmware
Subscribe
Iboot-pdu8sa-n20
Subscribe
Iboot-pdu8sa-n20 Firmware
Subscribe
Iboot Pdu
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43935 | The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 09 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dataprobe iboot Pdu
|
|
| CPEs | cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dataprobe iboot Pdu
|
|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2024-10-09T13:30:19.348Z
Reserved: 2023-06-15T06:48:44.547Z
Link: CVE-2023-3259
Updated: 2024-08-02T06:48:08.289Z
Status : Modified
Published: 2023-08-14T04:15:10.417
Modified: 2024-11-21T08:16:48.917
Link: CVE-2023-3259
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD