Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

10 vulnerabilities found for sel-451_firmware by selinc

CVE-2023-34390 (GCVE-0-2023-34390)

Vulnerability from nvd – Published: 2023-11-30 16:54 – Updated: 2024-08-02 16:10
VLAI?
Title
Improper input validation could lead to denial of service
Summary
An input validation vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to create a denial of service against the system and locking out services. See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
  • CWE-20 - Improper Input Validation
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:10:06.673Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An input validation vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to create a denial of service against the system and locking out services.\u003cbr\u003e\u003cbr\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An input validation vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to create a denial of service against the system and locking out services.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-25",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-25 Forced Deadlock"
            }
          ]
        },
        {
          "capecId": "CAPEC-469",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-469 HTTP DoS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:54:54.190Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": " Improper input validation could lead to denial of service",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-34390",
    "datePublished": "2023-11-30T16:54:54.190Z",
    "dateReserved": "2023-06-02T17:18:29.697Z",
    "dateUpdated": "2024-08-02T16:10:06.673Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34389 (GCVE-0-2023-34389)

Vulnerability from nvd – Published: 2023-11-30 16:54 – Updated: 2024-12-02 17:53
VLAI?
Title
Allocation of resources without limits could lead to denial of service
Summary
An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time. See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:10:06.826Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34389",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-12-05T15:22:53.970614Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T17:53:15.070Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time.\u003cbr\u003e\u003cbr\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-469",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-469 HTTP DoS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:54:29.986Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Allocation of resources without limits could lead to denial of service",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-34389",
    "datePublished": "2023-11-30T16:54:29.986Z",
    "dateReserved": "2023-06-02T17:18:29.697Z",
    "dateUpdated": "2024-12-02T17:53:15.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34388 (GCVE-0-2023-34388)

Vulnerability from nvd – Published: 2023-11-30 16:54 – Updated: 2025-06-03 13:46
VLAI?
Title
Improper authentication could lead to session hijacking
Summary
An Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication. See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
  • CWE-287 - Improper Authentication
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:10:07.027Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34388",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-03T13:45:41.836921Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T13:46:12.767Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An\u0026nbsp;Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication.\u003cbr\u003e\u003cbr\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An\u00a0Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-593",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-593 Session Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287 Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:54:08.503Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper authentication could lead to session hijacking",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-34388",
    "datePublished": "2023-11-30T16:54:08.503Z",
    "dateReserved": "2023-06-02T17:18:29.696Z",
    "dateUpdated": "2025-06-03T13:46:12.767Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31177 (GCVE-0-2023-31177)

Vulnerability from nvd – Published: 2023-11-30 16:53 – Updated: 2024-08-02 14:45
VLAI?
Title
Improper neutralizataion of input could lead to execution of arbitrary code
Summary
An Improper Neutralization of Input During Web Page Generation  ('Cross-site Scripting') in the Schweitzer Engineering Laboratories SEL-451 could allow an attacker to craft a link that could execute arbitrary code on a victim's system. See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:45:25.869Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An Improper Neutralization of Input During Web Page Generation\u0026nbsp; (\u0027Cross-site Scripting\u0027) in the Schweitzer Engineering Laboratories SEL-451 could allow an attacker to craft a link that could execute arbitrary code on a victim\u0027s system.\u003cbr\u003e\u003cbr\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An Improper Neutralization of Input During Web Page Generation\u00a0 (\u0027Cross-site Scripting\u0027) in the Schweitzer Engineering Laboratories SEL-451 could allow an attacker to craft a link that could execute arbitrary code on a victim\u0027s system.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        },
        {
          "capecId": "CAPEC-242",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-242 Code Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:53:34.046Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper neutralizataion of input could lead to execution of arbitrary code",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-31177",
    "datePublished": "2023-11-30T16:53:34.046Z",
    "dateReserved": "2023-04-24T23:20:01.610Z",
    "dateUpdated": "2024-08-02T14:45:25.869Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31176 (GCVE-0-2023-31176)

Vulnerability from nvd – Published: 2023-11-30 16:53 – Updated: 2024-10-16 19:21
VLAI?
Title
Insufficient entropy vulnerability could lead to authentication bypass
Summary
An Insufficient Entropy vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow an unauthenticated remote attacker to brute-force session tokens and bypass authentication.  See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:45:25.800Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sel-451_firmware",
            "vendor": "selinc",
            "versions": [
              {
                "lessThan": "R315-V4",
                "status": "affected",
                "version": "R315-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R316-V4",
                "status": "affected",
                "version": "R316-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R317-V4",
                "status": "affected",
                "version": "R317-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R318-V5",
                "status": "affected",
                "version": "R318-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R320-V3",
                "status": "affected",
                "version": "R320-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R321-V3",
                "status": "affected",
                "version": "R321-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R322-V3",
                "status": "affected",
                "version": "R322-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R323-V5",
                "status": "affected",
                "version": "R323-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R324-V4",
                "status": "affected",
                "version": "R324-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R325-V3",
                "status": "affected",
                "version": "R325-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R326-V1",
                "status": "affected",
                "version": "R326-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R327-V1",
                "status": "affected",
                "version": "R327-V0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31176",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T17:28:37.960490Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-16T19:21:05.142Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An Insufficient Entropy vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow an unauthenticated remote attacker to brute-force session tokens and bypass authentication.\u0026nbsp;\u003cbr\u003e\u003cp\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\u003c/p\u003e\n\n"
            }
          ],
          "value": "An Insufficient Entropy vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow an unauthenticated remote attacker to brute-force session tokens and bypass authentication.\u00a0\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-331",
              "description": "CWE-331 Insufficient Entropy",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:53:11.383Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Insufficient entropy vulnerability could lead to authentication bypass",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-31176",
    "datePublished": "2023-11-30T16:53:11.383Z",
    "dateReserved": "2023-04-24T23:20:01.609Z",
    "dateUpdated": "2024-10-16T19:21:05.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34390 (GCVE-0-2023-34390)

Vulnerability from cvelistv5 – Published: 2023-11-30 16:54 – Updated: 2024-08-02 16:10
VLAI?
Title
Improper input validation could lead to denial of service
Summary
An input validation vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to create a denial of service against the system and locking out services. See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
  • CWE-20 - Improper Input Validation
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:10:06.673Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An input validation vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to create a denial of service against the system and locking out services.\u003cbr\u003e\u003cbr\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An input validation vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to create a denial of service against the system and locking out services.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-25",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-25 Forced Deadlock"
            }
          ]
        },
        {
          "capecId": "CAPEC-469",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-469 HTTP DoS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:54:54.190Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": " Improper input validation could lead to denial of service",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-34390",
    "datePublished": "2023-11-30T16:54:54.190Z",
    "dateReserved": "2023-06-02T17:18:29.697Z",
    "dateUpdated": "2024-08-02T16:10:06.673Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34389 (GCVE-0-2023-34389)

Vulnerability from cvelistv5 – Published: 2023-11-30 16:54 – Updated: 2024-12-02 17:53
VLAI?
Title
Allocation of resources without limits could lead to denial of service
Summary
An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time. See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:10:06.826Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34389",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-12-05T15:22:53.970614Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T17:53:15.070Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time.\u003cbr\u003e\u003cbr\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-469",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-469 HTTP DoS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:54:29.986Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Allocation of resources without limits could lead to denial of service",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-34389",
    "datePublished": "2023-11-30T16:54:29.986Z",
    "dateReserved": "2023-06-02T17:18:29.697Z",
    "dateUpdated": "2024-12-02T17:53:15.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34388 (GCVE-0-2023-34388)

Vulnerability from cvelistv5 – Published: 2023-11-30 16:54 – Updated: 2025-06-03 13:46
VLAI?
Title
Improper authentication could lead to session hijacking
Summary
An Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication. See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
  • CWE-287 - Improper Authentication
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:10:07.027Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34388",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-03T13:45:41.836921Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T13:46:12.767Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An\u0026nbsp;Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication.\u003cbr\u003e\u003cbr\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An\u00a0Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        },
        {
          "capecId": "CAPEC-593",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-593 Session Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287 Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:54:08.503Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper authentication could lead to session hijacking",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-34388",
    "datePublished": "2023-11-30T16:54:08.503Z",
    "dateReserved": "2023-06-02T17:18:29.696Z",
    "dateUpdated": "2025-06-03T13:46:12.767Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31177 (GCVE-0-2023-31177)

Vulnerability from cvelistv5 – Published: 2023-11-30 16:53 – Updated: 2024-08-02 14:45
VLAI?
Title
Improper neutralizataion of input could lead to execution of arbitrary code
Summary
An Improper Neutralization of Input During Web Page Generation  ('Cross-site Scripting') in the Schweitzer Engineering Laboratories SEL-451 could allow an attacker to craft a link that could execute arbitrary code on a victim's system. See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:45:25.869Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An Improper Neutralization of Input During Web Page Generation\u0026nbsp; (\u0027Cross-site Scripting\u0027) in the Schweitzer Engineering Laboratories SEL-451 could allow an attacker to craft a link that could execute arbitrary code on a victim\u0027s system.\u003cbr\u003e\u003cbr\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\u003cbr\u003e"
            }
          ],
          "value": "An Improper Neutralization of Input During Web Page Generation\u00a0 (\u0027Cross-site Scripting\u0027) in the Schweitzer Engineering Laboratories SEL-451 could allow an attacker to craft a link that could execute arbitrary code on a victim\u0027s system.\n\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        },
        {
          "capecId": "CAPEC-242",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-242 Code Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:53:34.046Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper neutralizataion of input could lead to execution of arbitrary code",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-31177",
    "datePublished": "2023-11-30T16:53:34.046Z",
    "dateReserved": "2023-04-24T23:20:01.610Z",
    "dateUpdated": "2024-08-02T14:45:25.869Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31176 (GCVE-0-2023-31176)

Vulnerability from cvelistv5 – Published: 2023-11-30 16:53 – Updated: 2024-10-16 19:21
VLAI?
Title
Insufficient entropy vulnerability could lead to authentication bypass
Summary
An Insufficient Entropy vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow an unauthenticated remote attacker to brute-force session tokens and bypass authentication.  See product Instruction Manual Appendix A dated 20230830 for more details.
CWE
Assigner
SEL
Impacted products
Vendor Product Version
Schweitzer Engineering Laboratories SEL-451 Affected: R315-V0 , < R315-V4 (custom)
Affected: R316-V0 , < R316-V4 (custom)
Affected: R317-V0 , < R317-V4 (custom)
Affected: R318-V0 , < R318-V5 (custom)
Affected: R320-V0 , < R320-V3 (custom)
Affected: R321-V0 , < R321-V3 (custom)
Affected: R322-V0 , < R322-V3 (custom)
Affected: R323-V0 , < R323-V5 (custom)
Affected: R324-V0 , < R324-V4 (custom)
Affected: R325-V0 , < R325-V3 (custom)
Affected: R326-V0 , < R326-V1 (custom)
Affected: R327-V0 , < R327-V1 (custom)
Create a notification for this product.
Date Public ?
2023-11-30 09:56
Credits
Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:45:25.800Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://selinc.com/support/security-notifications/external-reports/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.nozominetworks.com/blog/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:selinc:sel-451_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sel-451_firmware",
            "vendor": "selinc",
            "versions": [
              {
                "lessThan": "R315-V4",
                "status": "affected",
                "version": "R315-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R316-V4",
                "status": "affected",
                "version": "R316-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R317-V4",
                "status": "affected",
                "version": "R317-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R318-V5",
                "status": "affected",
                "version": "R318-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R320-V3",
                "status": "affected",
                "version": "R320-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R321-V3",
                "status": "affected",
                "version": "R321-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R322-V3",
                "status": "affected",
                "version": "R322-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R323-V5",
                "status": "affected",
                "version": "R323-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R324-V4",
                "status": "affected",
                "version": "R324-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R325-V3",
                "status": "affected",
                "version": "R325-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R326-V1",
                "status": "affected",
                "version": "R326-V0",
                "versionType": "custom"
              },
              {
                "lessThan": "R327-V1",
                "status": "affected",
                "version": "R327-V0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31176",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T17:28:37.960490Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-16T19:21:05.142Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SEL-451",
          "vendor": "Schweitzer Engineering Laboratories",
          "versions": [
            {
              "lessThan": "R315-V4",
              "status": "affected",
              "version": "R315-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R316-V4",
              "status": "affected",
              "version": "R316-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R317-V4",
              "status": "affected",
              "version": "R317-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R318-V5",
              "status": "affected",
              "version": "R318-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R320-V3",
              "status": "affected",
              "version": "R320-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R321-V3",
              "status": "affected",
              "version": "R321-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R322-V3",
              "status": "affected",
              "version": "R322-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R323-V5",
              "status": "affected",
              "version": "R323-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R324-V4",
              "status": "affected",
              "version": "R324-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R325-V3",
              "status": "affected",
              "version": "R325-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R326-V1",
              "status": "affected",
              "version": "R326-V0",
              "versionType": "custom"
            },
            {
              "lessThan": "R327-V1",
              "status": "affected",
              "version": "R327-V0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Andrea Palanca and Gabriele Quagliarella of Nozomi Networks"
        }
      ],
      "datePublic": "2023-11-30T09:56:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An Insufficient Entropy vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow an unauthenticated remote attacker to brute-force session tokens and bypass authentication.\u0026nbsp;\u003cbr\u003e\u003cp\u003e\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\u003c/p\u003e\n\n"
            }
          ],
          "value": "An Insufficient Entropy vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow an unauthenticated remote attacker to brute-force session tokens and bypass authentication.\u00a0\n\n\nSee product Instruction Manual Appendix A dated 20230830 for more details.\n\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-331",
              "description": "CWE-331 Insufficient Entropy",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-30T16:53:11.383Z",
        "orgId": "5804bb70-792c-43e0-8596-486cc0efe699",
        "shortName": "SEL"
      },
      "references": [
        {
          "url": "https://selinc.com/support/security-notifications/external-reports/"
        },
        {
          "url": "https://www.nozominetworks.com/blog/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Insufficient entropy vulnerability could lead to authentication bypass",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5804bb70-792c-43e0-8596-486cc0efe699",
    "assignerShortName": "SEL",
    "cveId": "CVE-2023-31176",
    "datePublished": "2023-11-30T16:53:11.383Z",
    "dateReserved": "2023-04-24T23:20:01.609Z",
    "dateUpdated": "2024-10-16T19:21:05.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}