Executive Summary

Informations
Name CVE-2023-29446 First vendor Publication 2024-01-10
Vendor Cve Last vendor Modification 2024-01-19

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Overall CVSS Score 4.7
Base Score 4.7 Environmental Score 4.7
impact SubScore 3.6 Temporal Score 4.7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required None User Interaction Required
Scope Unchanged Confidentiality Impact High
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.Â

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29446

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 2
Application 3

Sources (Detail)

https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-03
https://www.dragos.com/advisory/ptcs-kepserverex-vulnerabilities/
https://www.ptc.com/en/support/article/cs399528
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-01-20 00:27:34
  • Multiple Updates
2024-01-11 17:27:25
  • Multiple Updates
2024-01-11 00:27:23
  • First insertion