CVE-2023-35802

IQ Engine before 10.6r1 on Extreme Network AP devices has a Buffer Overflow in the implementation of the CAPWAP protocol that may be exploited to obtain elevated privileges to conduct remote code execution. Access to the internal management interface/subnet is required to conduct the exploit.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:*
OR cpe:2.3:h:extremenetworks:ap122:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap130:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap150w:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap250:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap30:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap3000:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap3000x:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap302w:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap305c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap305c-1:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap305cx:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap4000:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap4000-1:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap410c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap410c-1:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap460c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap460s12c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap460s6c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap5010:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap5050d:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap5050u:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap510c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap510cx:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap630:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap650:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap650x:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:*
OR cpe:2.3:h:extremenetworks:ap1130:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap550:-:*:*:*:*:*:*:*

History

26 Jul 2023, 21:39

Type Values Removed Values Added
CPE cpe:2.3:h:extremenetworks:ap305c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap650x:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap5050u:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap460c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap510c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap550:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap1130:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap305cx:-:*:*:*:*:*:*:*
cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap130:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap305c-1:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap650:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap3000x:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap510cx:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap30:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap150w:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap5010:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap460s12c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap630:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap4000-1:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap410c-1:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap3000:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap302w:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap460s6c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap122:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap250:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap410c:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap4000:-:*:*:*:*:*:*:*
cpe:2.3:h:extremenetworks:ap5050d:-:*:*:*:*:*:*:*
First Time Extremenetworks ap410c
Extremenetworks ap3000
Extremenetworks ap150w
Extremenetworks ap130
Extremenetworks iq Engine
Extremenetworks ap250
Extremenetworks ap410c-1
Extremenetworks ap5010
Extremenetworks ap1130
Extremenetworks ap550
Extremenetworks ap650x
Extremenetworks ap3000x
Extremenetworks ap4000
Extremenetworks ap460s12c
Extremenetworks ap305c
Extremenetworks ap460s6c
Extremenetworks ap305c-1
Extremenetworks ap305cx
Extremenetworks ap122
Extremenetworks ap5050u
Extremenetworks ap650
Extremenetworks ap5050d
Extremenetworks ap460c
Extremenetworks
Extremenetworks ap630
Extremenetworks ap510c
Extremenetworks ap510cx
Extremenetworks ap4000-1
Extremenetworks ap302w
Extremenetworks ap30
References (CONFIRM) https://extremeportal.force.com/ExtrArticleDetail?an=000112741 - (CONFIRM) https://extremeportal.force.com/ExtrArticleDetail?an=000112741 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-120

15 Jul 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-15 02:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-35802

Mitre link : CVE-2023-35802

CVE.ORG link : CVE-2023-35802


JSON object : View

Products Affected

extremenetworks

  • ap650x
  • ap630
  • ap3000
  • ap250
  • ap5010
  • ap5050u
  • ap460s6c
  • iq_engine
  • ap122
  • ap4000-1
  • ap650
  • ap150w
  • ap30
  • ap410c
  • ap130
  • ap460c
  • ap4000
  • ap305c-1
  • ap302w
  • ap410c-1
  • ap3000x
  • ap460s12c
  • ap5050d
  • ap305c
  • ap1130
  • ap510c
  • ap305cx
  • ap550
  • ap510cx
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')