{"api_version":"1","generated_at":"2026-04-24T18:09:17+00:00","cve":"CVE-2023-24838","urls":{"html":"https://cve.report/CVE-2023-24838","api":"https://cve.report/api/cve/CVE-2023-24838.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-24838","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-24838"},"summary":{"title":"CVE-2023-24838","description":"HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator's credential. This credential can then be used to login PowerStation or Secure Shell to achieve remote code execution.","state":"PUBLIC","assigner":"cve@cert.org.tw","published_at":"2023-03-27 04:15:00","updated_at":"2023-06-05 18:59:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html","name":"N/A","refsource":"CONFIRM","tags":[],"title":"TWCERT/CC台灣電腦網路危機處理暨協調中心|企業資安通報協處|資安情資分享|漏洞通報|資安聯盟|資安電子報-HGiga PowerStation - Information Leakage","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-24838","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24838","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"24838","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"hgiga","cpe5":"powerstation","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24838","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"hgiga","cpe5":"powerstation_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"AKA":"TWCERT/CC","ASSIGNER":"cve@cert.org.tw","DATE_PUBLIC":"2023-02-24T03:19:00.000Z","ID":"CVE-2023-24838","STATE":"PUBLIC","TITLE":"HGiga PowerStation - Information Leakage"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PowerStation","version":{"version_data":[{"version_affected":"<","version_value":"x64.6.2.165"}]}}]},"vendor_name":"HGiga"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator's credential. This credential can then be used to login PowerStation or Secure Shell to achieve remote code execution."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200 Information Exposure"}]}]},"references":{"reference_data":[{"name":"https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html","refsource":"MISC","url":"https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html"}]},"solution":[{"lang":"eng","value":"Update PowerStation firmware version to x64.6.2.165, then reboot PowerStation."}],"source":{"advisory":"TVN-202302006","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2023-03-27 04:15:00","lastModifiedDate":"2023-06-05 18:59:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:hgiga:powerstation_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"x64.6.2.165","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:hgiga:powerstation:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}