// For flags

CVE-2023-4152

Frauscher FDS101 for FAdC/FAdCi path traversal vulnerability

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC (-)
Risk
CVSS Score
7.5 High
SSVC
Attend
KEV
-
EPSS
0.1%
Affected Products (-)
Vendors (1)
frauscher
Products (1)
frauscher_diagnostic_system_101
Versions (1)
<= 1.4.24
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (1)
General (1)
vde
Exploits & POcs (-)
Patches (-)
Advisories (-)
Summary
Descriptions

Frauscher Sensortechnik GmbH FDS101 for FAdC/FAdCi v1.4.24 and all previous versions are vulnerable to a path traversal vulnerability of the web interface by a crafted URL without authentication. This enables an remote attacker to read all files on the filesystem of the FDS101 device.

Frauscher Sensortechnik GmbH FDS101 para FAdC/FAdCi v1.4.24 y todas las versiones anteriores son vulnerables a una vulnerabilidad de Path Traversal de la interfaz web mediante una URL manipulada sin autenticación. Esto permite a un atacante remoto leer todos los archivos en el sistema de archivos del dispositivo FDS101.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-08-04 CVE Reserved
  • 2023-09-21 CVE Published
  • 2024-09-24 CVE Updated
  • 2025-01-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

References (1)
URL Tag Source
https://cert.vde.com/en/advisories/VDE-2023-038 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Frauscher
Search vendor "Frauscher"
Frauscher Diagnostic System 101
Search vendor "Frauscher" for product "Frauscher Diagnostic System 101"
<= 1.4.24
Search vendor "Frauscher" for product "Frauscher Diagnostic System 101" and version " <= 1.4.24"
fadc
Affected
Frauscher
Search vendor "Frauscher"
Frauscher Diagnostic System 101
Search vendor "Frauscher" for product "Frauscher Diagnostic System 101"
<= 1.4.24
Search vendor "Frauscher" for product "Frauscher Diagnostic System 101" and version " <= 1.4.24"
fadci
Affected