The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database. A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records.

Project Subscriptions

Vendors Products
Cyberpower Subscribe
Powerpanel Server Subscribe
Dataprobe Subscribe
Iboot-pdu4-c20 Subscribe
Iboot-pdu4-c20 Firmware Subscribe
Iboot-pdu4-n20 Subscribe
Iboot-pdu4-n20 Firmware Subscribe
Iboot-pdu4a-c10 Subscribe
Iboot-pdu4a-c10 Firmware Subscribe
Iboot-pdu4a-c20 Subscribe
Iboot-pdu4a-c20 Firmware Subscribe
Iboot-pdu4a-n15 Subscribe
Iboot-pdu4a-n15 Firmware Subscribe
Iboot-pdu4a-n20 Subscribe
Iboot-pdu4a-n20 Firmware Subscribe
Iboot-pdu4sa-c10 Subscribe
Iboot-pdu4sa-c10 Firmware Subscribe
Iboot-pdu4sa-c20 Subscribe
Iboot-pdu4sa-c20 Firmware Subscribe
Iboot-pdu4sa-n15 Subscribe
Iboot-pdu4sa-n15 Firmware Subscribe
Iboot-pdu4sa-n20 Subscribe
Iboot-pdu4sa-n20 Firmware Subscribe
Iboot-pdu8a-2c10 Subscribe
Iboot-pdu8a-2c10 Firmware Subscribe
Iboot-pdu8a-2c20 Subscribe
Iboot-pdu8a-2c20 Firmware Subscribe
Iboot-pdu8a-2n15 Subscribe
Iboot-pdu8a-2n15 Firmware Subscribe
Iboot-pdu8a-2n20 Subscribe
Iboot-pdu8a-2n20 Firmware Subscribe
Iboot-pdu8a-c10 Subscribe
Iboot-pdu8a-c10 Firmware Subscribe
Iboot-pdu8a-c20 Subscribe
Iboot-pdu8a-c20 Firmware Subscribe
Iboot-pdu8a-n15 Subscribe
Iboot-pdu8a-n15 Firmware Subscribe
Iboot-pdu8a-n20 Subscribe
Iboot-pdu8a-n20 Firmware Subscribe
Iboot-pdu8sa-2n15 Subscribe
Iboot-pdu8sa-2n15 Firmware Subscribe
Iboot-pdu8sa-c10 Subscribe
Iboot-pdu8sa-c10 Firmware Subscribe
Iboot-pdu8sa-n15 Subscribe
Iboot-pdu8sa-n15 Firmware Subscribe
Iboot-pdu8sa-n20 Subscribe
Iboot-pdu8sa-n20 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-43940 The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database. A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 09 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-10-09T14:40:56.865Z

Reserved: 2023-06-15T06:50:29.804Z

Link: CVE-2023-3264

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:08.569Z

cve-icon NVD

Status : Modified

Published: 2023-08-14T05:15:09.910

Modified: 2024-11-21T08:16:49.760

Link: CVE-2023-3264

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses