IQ Engine before 10.6r2 on Extreme Network AP devices has a Buffer Overflow.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 08:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472 - Vendor Advisory |
10 Oct 2023, 20:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:extremenetworks:ap510cx:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap122:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap460s12c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap1130:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap3000:-:*:*:*:*:*:*:* cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap302w:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap305c-1:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap5050d:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap30:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap650x:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap410c-1:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap130:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap410c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap460c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap305cx:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap150w:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap3000x:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap4000-1:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap5010:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap460s6c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap4000:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap630:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap305c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap550:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap510c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap250:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap650:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap5050u:-:*:*:*:*:*:*:* |
|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Extremenetworks ap3000x
Extremenetworks ap250 Extremenetworks ap650x Extremenetworks ap30 Extremenetworks ap650 Extremenetworks ap460s12c Extremenetworks ap5010 Extremenetworks ap3000 Extremenetworks ap460c Extremenetworks ap550 Extremenetworks ap305cx Extremenetworks ap410c Extremenetworks ap302w Extremenetworks ap460s6c Extremenetworks ap5050d Extremenetworks ap510c Extremenetworks ap4000 Extremenetworks ap510cx Extremenetworks ap410c-1 Extremenetworks ap305c-1 Extremenetworks ap130 Extremenetworks ap305c Extremenetworks Extremenetworks iq Engine Extremenetworks ap5050u Extremenetworks ap150w Extremenetworks ap1130 Extremenetworks ap122 Extremenetworks ap630 Extremenetworks ap4000-1 |
|
References | (MISC) https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472 - Vendor Advisory |
04 Oct 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-04 22:15
Updated : 2024-11-21 08:08
NVD link : CVE-2023-35803
Mitre link : CVE-2023-35803
CVE.ORG link : CVE-2023-35803
JSON object : View
Products Affected
extremenetworks
- ap410c-1
- ap4000-1
- ap650
- ap550
- ap460c
- ap302w
- ap130
- ap460s12c
- ap460s6c
- ap305c-1
- ap5010
- iq_engine
- ap3000x
- ap1130
- ap122
- ap510cx
- ap410c
- ap650x
- ap3000
- ap510c
- ap305c
- ap5050u
- ap150w
- ap630
- ap5050d
- ap250
- ap4000
- ap30
- ap305cx
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')