CVE Published: 18/07/2023 |
CVE Updated: 28/10/2024 |
CVE Year: 2023 Source: AMI |
Vendor: AMI |
Product: MegaRAC_SPx12 Status : PUBLISHED
CVE-2023-34330 Description
AMI SPx contains a vulnerability in the BMC where a user may inject code which could be executed via a Dynamic Redfish Extension interface. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.
Metrics
CVSS Version: 3.1 |
Base Score: 8.2 HIGH Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
l➤ Exploitability Metrics: Attack Vector (AV)* LOCAL Attack Complexity (AC)* LOW Privileges Required (PR)* HIGH User Interaction (UI)* NONE Scope (S)* CHANGED
l➤ Impact Metrics: Confidentiality Impact (C)* HIGH Integrity Impact (I)* HIGH Availability Impact (A)* HIGH
Weakness Enumeration (CWE)
CWE-ID: CWE-94 CWE Name: CWE-94 Improper Control of Generation of Code (
Code Injection
) Source: AMI
Common Attack Pattern Enumeration and Classification (CAPEC)