CVE-2023-3786

A vulnerability classified as problematic has been found in Aures Komet up to 20230509. This affects an unknown part of the component Kiosk Mode. The manipulation leads to improper access controls. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier VDB-235053 was assigned to this vulnerability.
References
Link Resource
https://seclists.org/fulldisclosure/2023/Jul/40 Mailing List Third Party Advisory
https://vuldb.com/?ctiid.235053 Permissions Required VDB Entry
https://vuldb.com/?id.235053 Permissions Required Third Party Advisory VDB Entry
https://www.vulnerability-lab.com/get_content.php?id=2323 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:aures:komet_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:aures:komet:-:*:*:*:*:*:*:*

History

31 Jul 2023, 17:06

Type Values Removed Values Added
CPE cpe:2.3:o:aures:komet_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:aures:komet:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
First Time Aures
Aures komet
Aures komet Firmware
References (MISC) https://vuldb.com/?ctiid.235053 - (MISC) https://vuldb.com/?ctiid.235053 - Permissions Required, VDB Entry
References (MISC) https://vuldb.com/?id.235053 - (MISC) https://vuldb.com/?id.235053 - Permissions Required, Third Party Advisory, VDB Entry
References (MISC) https://seclists.org/fulldisclosure/2023/Jul/40 - (MISC) https://seclists.org/fulldisclosure/2023/Jul/40 - Mailing List, Third Party Advisory
References (MISC) https://www.vulnerability-lab.com/get_content.php?id=2323 - (MISC) https://www.vulnerability-lab.com/get_content.php?id=2323 - Third Party Advisory
CWE CWE-284 NVD-CWE-Other

20 Jul 2023, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-20 13:15

Updated : 2024-04-11 01:21


NVD link : CVE-2023-3786

Mitre link : CVE-2023-3786

CVE.ORG link : CVE-2023-3786


JSON object : View

Products Affected

aures

  • komet_firmware
  • komet
CWE
NVD-CWE-Other CWE-284

Improper Access Control