{"api_version":"1","generated_at":"2026-04-23T09:53:29+00:00","cve":"CVE-2023-23119","urls":{"html":"https://cve.report/CVE-2023-23119","api":"https://cve.report/api/cve/CVE-2023-23119.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-23119","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-23119"},"summary":{"title":"CVE-2023-23119","description":"The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes Ubiquiti airFiber AF2X Radio firmware version 3.2.2 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-02-02 17:17:00","updated_at":"2023-02-10 16:03:00"},"problem_types":["CWE-354"],"metrics":[],"references":[{"url":"https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SkYce4f5o","name":"https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SkYce4f5o","refsource":"MISC","tags":[],"title":"Weak Firmware Integrity Check Vulnerability During Firmware Update in Ubiquiti airFiber AF2X Radio - HackMD","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://community.ui.com/tags/security/releases","name":"https://community.ui.com/tags/security/releases","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SkYce4f5o","name":"https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SkYce4f5o","refsource":"MISC","tags":[],"title":"Weak Firmware Integrity Check Vulnerability During Firmware Update in Ubiquiti airFiber AF2X Radio - HackMD","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-23119","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23119","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"23119","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ui","cpe5":"af-2x","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"23119","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ui","cpe5":"af-2x_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-23119","ASSIGNER":"cve@mitre.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes Ubiquiti airFiber AF2X Radio firmware version 3.2.2 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a","version_affected":"?"}]}}]}}]}},"references":{"reference_data":[{"url":"https://community.ui.com/tags/security/releases","refsource":"MISC","name":"https://community.ui.com/tags/security/releases"},{"url":"https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SkYce4f5o","refsource":"MISC","name":"https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SkYce4f5o"}]}},"nvd":{"publishedDate":"2023-02-02 17:17:00","lastModifiedDate":"2023-02-10 16:03:00","problem_types":["CWE-354"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ui:af-2x_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.2.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:ui:af-2x:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}