LOW · 2.7

CVE-2023-2622

Authenticated clients can read arbitrary files on the MAIN Computer system using the remote procedure call (RPC) of the InspectSetup service endpoint. The low privilege client is then allowed to read...

Vulnerability Description

Authenticated clients can read arbitrary files on the MAIN Computer system using the remote procedure call (RPC) of the InspectSetup service endpoint. The low privilege client is then allowed to read arbitrary files that they do not have authorization to read.

CVSS Score

2.7

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
HitachienergyModular Advanced Control For Hvdc>= 7.10.0.0, <= 7.18.0.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-2622?

CVE-2023-2622 is a vulnerability with a CVSS score of 2.7 (LOW). Authenticated clients can read arbitrary files on the MAIN Computer system using the remote procedure call (RPC) of the InspectSetup service endpoint. The low privilege client is then allowed to read...

How severe is CVE-2023-2622?

CVE-2023-2622 has been rated LOW with a CVSS base score of 2.7/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-2622?

Check the references section above for vendor advisories and patch information. Affected products include: Hitachienergy Modular Advanced Control For Hvdc.