CRITICAL · 9.1

CVE-2023-33219

The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation operations. This allows a stack-based buffer overflow that could lead to a...

Vulnerability Description

The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation operations. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device

CVSS Score

9.1

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
IdemiaSigma Lite Firmware< 4.15.5
IdemiaSigma Lite-
IdemiaSigma Lite\+ Firmware< 4.15.5
IdemiaSigma Lite\+-
IdemiaSigma Extreme Firmware< 4.15.5
IdemiaSigma Extreme-
IdemiaSigma Wide Firmware< 4.15.5
IdemiaSigma Wide-
IdemiaMorphowave Compact Firmware< 2.12.2
IdemiaMorphowave Compact-
IdemiaMorphowave Xp Firmware< 2.12.2
IdemiaMorphowave Xp-
IdemiaVisionpass Firmware< 2.12.2
IdemiaVisionpass-
IdemiaMorphowave Sp Firmware< 1.2.7
IdemiaMorphowave Sp-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-33219?

CVE-2023-33219 is a vulnerability with a CVSS score of 9.1 (CRITICAL). The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation operations. This allows a stack-based buffer overflow that could lead to a...

How severe is CVE-2023-33219?

CVE-2023-33219 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2023-33219?

Check the references section above for vendor advisories and patch information. Affected products include: Idemia Sigma Lite Firmware, Idemia Sigma Lite, Idemia Sigma Lite\+ Firmware, Idemia Sigma Lite\+, Idemia Sigma Extreme Firmware.