CVE-2023-5328

A vulnerability classified as critical has been found in SATO CL4NX-J Plus 1.13.2-u455_r2. This affects an unknown part of the component Cookie Handler. The manipulation with the input auth=user,level1,settings; web=true leads to improper authentication. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-241029 was assigned to this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sato:cl4nx-j_plus_firmware:1.13.2-u455_r2:*:*:*:*:*:*:*
cpe:2.3:h:sato:cl4nx-j_plus:-:*:*:*:*:*:*:*

History

04 Oct 2023, 14:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Sato
Sato cl4nx-j Plus
Sato cl4nx-j Plus Firmware
References (MISC) https://vuldb.com/?ctiid.241029 - (MISC) https://vuldb.com/?ctiid.241029 - Third Party Advisory
References (MISC) https://vuldb.com/?id.241029 - (MISC) https://vuldb.com/?id.241029 - Third Party Advisory
References (MISC) https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20cookie/README.md - (MISC) https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20cookie/README.md - Third Party Advisory
CPE cpe:2.3:h:sato:cl4nx-j_plus:-:*:*:*:*:*:*:*
cpe:2.3:o:sato:cl4nx-j_plus_firmware:1.13.2-u455_r2:*:*:*:*:*:*:*

02 Oct 2023, 00:44

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-02 00:15

Updated : 2024-04-11 01:22


NVD link : CVE-2023-5328

Mitre link : CVE-2023-5328

CVE.ORG link : CVE-2023-5328


JSON object : View

Products Affected

sato

  • cl4nx-j_plus_firmware
  • cl4nx-j_plus
CWE
CWE-287

Improper Authentication