Show plain JSON{"id": "CVE-2023-41303", "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2023-09-25T13:15:11.557", "references": [{"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158", "tags": ["Vendor Advisory"], "source": "psirt@huawei.com"}, {"url": "https://https://consumer.huawei.com/en/support/bulletin/2023/9/", "tags": ["Broken Link", "Vendor Advisory"], "source": "psirt@huawei.com"}, {"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://https://consumer.huawei.com/en/support/bulletin/2023/9/", "tags": ["Broken Link", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "psirt@huawei.com", "description": [{"lang": "en", "value": "CWE-20"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-77"}]}], "descriptions": [{"lang": "en", "value": "Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n de comandos en el m\u00f3dulo del sistema de archivos distribuido. La explotaci\u00f3n exitosa de esta vulnerabilidad puede causar que se modifiquen variables en la estructura del sock."}], "lastModified": "2024-11-21T08:21:01.600", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"}, {"criteria": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DF07E7F-3A18-4B74-B73D-DF3647C2A48F"}, {"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"}, {"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"}, {"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64118936-E2A5-4935-8594-29DF29B5475A"}, {"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"}, {"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"}, {"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@huawei.com"}