Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-3942", "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "state": "PUBLISHED", "assignerShortName": "Kaspersky", "dateReserved": "2023-07-25T14:15:32.367Z", "datePublished": "2024-05-21T12:23:49.526Z", "dateUpdated": "2024-08-02T07:08:50.624Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unknown", "product": "ZkTeco-based OEM devices with firmware ZAM170-NF-1.8.25-7354-Ver1.0.0, Standalone service v. 2.1.6-20200907", "vendor": "ZkTeco", "versions": [{"status": "affected", "version": "ZAM170-NF-1.8.25-7354-Ver1.0.0"}, {"status": "affected", "version": "Standalone service v. 2.1.6-20200907"}]}], "credits": [{"lang": "en", "type": "finder", "value": "The vulnerability was discovered by Georgy Kiguradze from Kaspersky"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "An 'SQL Injection' vulnerability, due to improper neutralization of special elements used in SQL commands, exists in ZKTeco-based OEM devices. This vulnerability allows an attacker to, in some cases, impersonate another user or perform unauthorized actions. In other instances, it enables the attacker to access user data and system parameters from the database.<br><p>This issue affects \nZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others)\n\n with firmware \nZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly other, Standalone service v. 2.1.6-20200907 and possibly others.\n\n</p>"}], "value": "An 'SQL Injection' vulnerability, due to improper neutralization of special elements used in SQL commands, exists in ZKTeco-based OEM devices. This vulnerability allows an attacker to, in some cases, impersonate another user or perform unauthorized actions. In other instances, it enables the attacker to access user data and system parameters from the database.\nThis issue affects \nZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others)\n\n with firmware \nZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly other, Standalone service v. 2.1.6-20200907 and possibly others."}], "impacts": [{"capecId": "CAPEC-66", "descriptions": [{"lang": "en", "value": "CAPEC-66 SQL Injection"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky", "dateUpdated": "2024-05-21T12:23:49.526Z"}, "references": [{"url": "https://github.com/klsecservices/Advisories/blob/master/K-ZkTeco-2023-005.md"}], "source": {"discovery": "UNKNOWN"}, "timeline": [{"lang": "en", "time": "2023-04-27T21:00:00.000Z", "value": "Vulnerability discovered."}, {"lang": "en", "time": "2023-09-19T14:00:00.000Z", "value": "Initial request to PSIRT@zkteco.com."}, {"lang": "en", "time": "2023-10-03T13:18:00.000Z", "value": "Follow-up with PSIRT@zkteco.com due to no initial response."}, {"lang": "en", "time": "2023-12-20T10:46:00.000Z", "value": "Vulnerability reported to PSIRT@zkteco.com in plaintext."}, {"lang": "en", "time": "2024-05-21T12:23:00.000Z", "value": "No response from vendor; CVE details added to CVE.org."}], "title": "Multiple SQLi in ZkTeco-based OEM devices", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2023-3942", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-05-21T14:16:48.876752Z"}}}], "affected": [{"cpes": ["cpe:2.3:h:zkteco:smartec_st_fr043:*:*:*:*:*:*:*:*"], "vendor": "zkteco", "product": "smartec_st_fr043", "versions": [{"status": "affected", "version": "0", "versionType": "custom", "lessThanOrEqual": "ZAM170-NF-1.8.25-7354-Ver1.0.0"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:h:zkteco:smartec_st_fr041me:*:*:*:*:*:*:*:*"], "vendor": "zkteco", "product": "smartec_st_fr041me", "versions": [{"status": "affected", "version": "0", "versionType": "custom", "lessThanOrEqual": "ZAM170-NF-1.8.25-7354-Ver1.0.0"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:h:zkteco:facedepot_7b:-:*:*:*:*:*:*:*"], "vendor": "zkteco", "product": "facedepot_7b", "versions": [{"status": "affected", "version": "0", "versionType": "custom", "lessThanOrEqual": "ZAM170-NF-1.8.25-7354-Ver1.0.0"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:17:31.691Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T07:08:50.624Z"}, "title": "CVE Program Container", "references": [{"url": "https://github.com/klsecservices/Advisories/blob/master/K-ZkTeco-2023-005.md", "tags": ["x_transferred"]}]}]}}