CVE-2023-43775

Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows attacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is not vulnerable anymore.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:eaton:smp_sg-4260:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4250_firmware:7.0:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4250_firmware:7.1:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4250_firmware:7.2:*:*:*:*:*:*:*
cpe:2.3:h:eaton:smp_sg-4250:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:eaton:smp_4\/dp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:6.3:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:7.0:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:7.1:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:7.2:*:*:*:*:*:*:*
cpe:2.3:h:eaton:smp_4\/dp:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:eaton:smp_16_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:6.3:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:7.0:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:7.1:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:7.2:*:*:*:*:*:*:*
cpe:2.3:h:eaton:smp_16:-:*:*:*:*:*:*:*

History

02 Oct 2023, 18:32

Type Values Removed Values Added
References (MISC) https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2022-1008.pdf - (MISC) https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2022-1008.pdf - Vendor Advisory
CPE cpe:2.3:o:eaton:smp_sg-4250_firmware:7.2:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:6.3:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:eaton:smp_sg-4260:-:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:7.1:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:6.3:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:7.0:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:7.0:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:eaton:smp_4\/dp:-:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4250_firmware:7.0:*:*:*:*:*:*:*
cpe:2.3:h:eaton:smp_sg-4250:-:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_4\/dp_firmware:7.2:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:7.1:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_16_firmware:7.2:*:*:*:*:*:*:*
cpe:2.3:o:eaton:smp_sg-4250_firmware:7.1:*:*:*:*:*:*:*
cpe:2.3:h:eaton:smp_16:-:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Eaton smp 4\/dp
Eaton smp Sg-4260 Firmware
Eaton smp Sg-4260
Eaton smp 16
Eaton smp Sg-4250
Eaton
Eaton smp Sg-4250 Firmware
Eaton smp 4\/dp Firmware
Eaton smp 16 Firmware

28 Sep 2023, 21:15

Type Values Removed Values Added
Summary Denial-of-service vulnerability in the web server of the Eaton SMP SG-4260 allows attacker to potentially force an unexpected restart of the SMP Gateway automation platform, impacting the availability of the product. In rare situations, the issue could cause the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is not vulnerable anymore. Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows attacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is not vulnerable anymore.

27 Sep 2023, 15:19

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 15:19

Updated : 2024-02-28 20:33


NVD link : CVE-2023-43775

Mitre link : CVE-2023-43775

CVE.ORG link : CVE-2023-43775


JSON object : View

Products Affected

eaton

  • smp_sg-4260_firmware
  • smp_16
  • smp_sg-4250_firmware
  • smp_sg-4260
  • smp_sg-4250
  • smp_16_firmware
  • smp_4\/dp_firmware
  • smp_4\/dp
CWE
NVD-CWE-noinfo CWE-400

Uncontrolled Resource Consumption