The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database.A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records.
History

Wed, 09 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Dataprobe iboot Pdu
CPEs cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:*
Vendors & Products Dataprobe iboot Pdu
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published: 2023-08-14T03:59:51.212Z

Updated: 2024-10-09T14:45:31.470Z

Reserved: 2023-06-15T06:50:25.309Z

Link: CVE-2023-3262

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:08.276Z

cve-icon NVD

Status : Modified

Published: 2023-08-14T04:15:11.043

Modified: 2024-11-21T08:16:49.413

Link: CVE-2023-3262

cve-icon Redhat

No data.