Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-45163", "assignerOrgId": "4a68d2b9-b68a-4765-95bd-17f35092666b", "state": "PUBLISHED", "assignerShortName": "1E", "dateReserved": "2023-10-04T23:59:54.079Z", "datePublished": "2023-11-06T12:19:20.662Z", "dateUpdated": "2024-09-05T13:51:18.601Z"}, "containers": {"cna": {"affected": [{"collectionURL": "https://exchange.1e.com/product-packs/network/", "defaultStatus": "affected", "packageName": "1E-Exchange-CommandLinePing", "platforms": ["Windows"], "product": "Platform", "vendor": "1E", "versions": [{"lessThan": "18.1", "status": "affected", "version": "0", "versionType": "Update"}]}], "credits": [{"lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Lockheed Martin red team"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "\n\n<span style=\"background-color: rgb(255, 255, 255);\">The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.</span><br><br><span style=\"background-color: rgb(255, 255, 255);\">To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI</span>\n\n"}], "value": "\nThe 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI\n\n"}], "impacts": [{"capecId": "CAPEC-248", "descriptions": [{"lang": "en", "value": "CAPEC-248 Command Injection"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "4a68d2b9-b68a-4765-95bd-17f35092666b", "shortName": "1E", "dateUpdated": "2023-11-21T17:43:41.290Z"}, "references": [{"url": "https://https://exchange.1e.com/product-packs/network/"}, {"url": "https://www.1e.com/trust-security-compliance/cve-info/"}], "source": {"discovery": "UNKNOWN"}, "title": "1E-Exchange-CommandLinePing instruction before v18.1 allows for arbitrary code execution", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T20:14:19.022Z"}, "title": "CVE Program Container", "references": [{"url": "https://https://exchange.1e.com/product-packs/network/", "tags": ["x_transferred"]}, {"url": "https://www.1e.com/trust-security-compliance/cve-info/", "tags": ["x_transferred"]}]}, {"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-20", "lang": "en", "description": "CWE-20 Improper Input Validation"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-05T13:47:21.798997Z", "id": "CVE-2023-45163", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-05T13:51:18.601Z"}}]}}