The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.
.This CVE has a CVSS3.1 score of 8.8 and a Base Severity of HIGH.
Info | Details |
---|---|
CVE ID | CVE-2023-40221 |
CVE State | PUBLISHED |
BaseScore | 8.8 |
BaseSeverity | HIGH |
VectorString | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Version | NA |
References for CVE-2023-40221 :
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NETWORK |
AttackComplexity(AC) | LOW |
PrivilegesRequired(PR) | NONE |
UserInteraction(UI) | REQUIRED |
Scope(S) | UNCHANGED |
Confidentiality(C) | HIGH |
Availability(A) | HIGH |
Integrity(I) | HIGH |