CVE-2023-39548

CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.
References
Link Resource
https://jpn.nec.com/security-info/secinfo/nv23-009_en.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:windows:*:*

History

28 Dec 2023, 17:55

Type Values Removed Values Added
CPE cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:5.1:*:*:*:*:windows:*:*

24 Nov 2023, 18:22

Type Values Removed Values Added
References () https://jpn.nec.com/security-info/secinfo/nv23-009_en.html - () https://jpn.nec.com/security-info/secinfo/nv23-009_en.html - Patch, Third Party Advisory
CWE CWE-434
First Time Nec
Nec expresscluster X
Nec expresscluster X Singleserversafe
CPE cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:3.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.3:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.2:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:4.3:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:5.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:1.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:3.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:2.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:3.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:2.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x:5.0:*:*:*:*:linux:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:1.0:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:windows:*:*
cpe:2.3:a:nec:expresscluster_x_singleserversafe:2.1:*:*:*:*:linux:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

24 Nov 2023, 12:15

Type Values Removed Values Added
Summary CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.0 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.0 and earlier allows a attacker to log in to the product may execute an arbitrary command. CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.

17 Nov 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-17 06:15

Updated : 2023-12-28 17:55


NVD link : CVE-2023-39548

Mitre link : CVE-2023-39548

CVE.ORG link : CVE-2023-39548


JSON object : View

Products Affected

nec

  • expresscluster_x
  • expresscluster_x_singleserversafe
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type