CVE-2023-3892 Vulnerability Details

  /     /     /  

CVE-2023-3892 Metadata Quick Info

CVE Published: 19/09/2023 | CVE Updated: 25/09/2024 | CVE Year: 2023
Source: MIM | Vendor: MIM Software | Product: MIM Assistant
Status : PUBLISHED

CVE-2023-3892 Description

Improper Restriction of XML External Entity Reference vulnerability in MIM Assistant and Client DICOM RTst Loading modules allows XML Entity Linking / XML External Entities Blowup. In order to take advantage of this vulnerability, an attacker must craft a malicious XML document, embed this document into specific 3rd party private RTst metadata tags, transfer the now compromised DICOM object to MIM, and force MIM to archive and load the data. Users on either version are strongly encouraged to update to an unaffected version (7.2.11+, 7.3.4+). This issue was found and analyzed by MIM Software\'s internal security team.  We are unaware of any proof of concept or actual exploit available in the wild. For more information, visit https://www.mimsoftware.com/cve-2023-3892 https://www.mimsoftware.com/cve-2023-3892 This issue affects MIM Assistant: 7.2.10, 7.3.3; MIM Client: 7.2.10, 7.3.3.

Metrics

CVSS Version: 3.1 | Base Score: 5.6 MEDIUM
Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* ADJACENT_NETWORK
    Attack Complexity (AC)* HIGH
    Privileges Required (PR)* LOW
    User Interaction (UI)* REQUIRED
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* LOW
    Integrity Impact (I)* LOW
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-611
CWE Name: CWE-611 Improper Restriction of XML External Entity Reference
Source: MIM Software

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-201
CAPEC Description: CAPEC-201 XML Entity Linking


Source: NVD (National Vulnerability Database).