CVE-2023-5326
Summary
| CVE | CVE-2023-5326 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-01 23:15:00 UTC |
| Updated | 2023-11-07 04:23:00 UTC |
| Description | A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Sato | Cl4nx-j Plus | - | All | All | All |
| Operating System | Sato | Cl4nx-j Plus Firmware | 1.13.2-u455_r2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SATO CL4NX-J Plus Authentication Bypass | MISC | github.com | |
| Login required | MISC | vuldb.com | |
| CVE-2023-5326: SATO CL4NX-J Plus WebConfig improper authentication | MISC | vuldb.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.