The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.
The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware.
This could lead to unauthorized access and data leakage
References
Link | Resource |
---|---|
https://www.idemia.com/vulnerability-information | Vendor Advisory |
https://www.idemia.com/vulnerability-information | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
No history.
Information
Published : 2023-11-28 09:15
Updated : 2024-11-21 08:35
NVD link : CVE-2023-4667
Mitre link : CVE-2023-4667
CVE.ORG link : CVE-2023-4667
JSON object : View
Products Affected
idemia
- sgima_lite_\&_lite\+_firmware
- morphowave_sp
- morphowave_compact_firmware
- sigma_wide_firmware
- sigma_wide
- morphowave_compact
- visionpass_firmware
- sgima_lite_\&_lite\+
- visionpass
- morphowave_sp_firmware
- sigma_extreme
- sigma_extreme_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')