// For flags

CVE-2023-28078

 

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Dell OS10 Networking Switches running 10.5.2.x and above contain a vulnerability with zeroMQ when VLT is configured. A remote unauthenticated attacker could potentially exploit this vulnerability leading to information disclosure and a possible Denial of Service when a huge number of requests are sent to the switch. This is a high severity vulnerability as it allows an attacker to view sensitive data. Dell recommends customers to upgrade at the earliest opportunity.

Los conmutadores de red Dell OS10 que ejecutan 10.5.2.x y versiones posteriores contienen una vulnerabilidad con zeroMQ cuando se configura VLT. Un atacante remoto no autenticado podría explotar esta vulnerabilidad, lo que provocaría la divulgación de información y una posible denegación de servicio cuando se envía una gran cantidad de solicitudes al conmutador. Esta es una vulnerabilidad de alta gravedad ya que permite a un atacante ver datos confidenciales. Dell recomienda a los clientes actualizar lo antes posible.

*Credits: Rafael Schaefer, ERNW Enno Rey Netzwerke GmbH
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-03-10 CVE Reserved
  • 2024-02-15 CVE Published
  • 2024-02-16 EPSS Updated
  • 2024-08-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-923: Improper Restriction of Communication Channel to Intended Endpoints
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dell
Search vendor "Dell"
Dell SmartFabric OS10
Search vendor "Dell" for product "Dell SmartFabric OS10"
10.5.5.0
Search vendor "Dell" for product "Dell SmartFabric OS10" and version "10.5.5.0"
en
Affected
Dell
Search vendor "Dell"
Dell SmartFabric OS10
Search vendor "Dell" for product "Dell SmartFabric OS10"
10.5.5.3
Search vendor "Dell" for product "Dell SmartFabric OS10" and version "10.5.5.3"
en
Affected
Dell
Search vendor "Dell"
Dell SmartFabric OS10
Search vendor "Dell" for product "Dell SmartFabric OS10"
10.5.5.1
Search vendor "Dell" for product "Dell SmartFabric OS10" and version "10.5.5.1"
en
Affected
Dell
Search vendor "Dell"
Dell SmartFabric OS10
Search vendor "Dell" for product "Dell SmartFabric OS10"
10.5.5.2
Search vendor "Dell" for product "Dell SmartFabric OS10" and version "10.5.5.2"
en
Affected
Dell
Search vendor "Dell"
Dell SmartFabric OS10
Search vendor "Dell" for product "Dell SmartFabric OS10"
10.5.4.6
Search vendor "Dell" for product "Dell SmartFabric OS10" and version "10.5.4.6"
en
Affected