Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Assign CVE-2023-24011 #8693

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
98 changes: 91 additions & 7 deletions 2023/24xxx/CVE-2023-24011.json
Original file line number Diff line number Diff line change
@@ -1,18 +1,102 @@
{
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CNA(s) of user (Alias) do not match owning CNA.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Similar to #8692 (comment), kindly note:

Alias Robotics has robotics-related components within its scope and previously triaged and reported flaws concerning DDS technology and this vendor.

"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"DATE_PUBLIC": "2023-02-25T09:51:12 +00:00",
"ID": "CVE-2023-24011",
"ASSIGNER": "[email protected]",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "RVD#3346: Data Distribution Service (DDS) Chain of Trust (CoT) violation in Cyclone DDS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "DDS",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
}
]
},
"vendor_name": "ZettaScale"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "amrc-benmorrow, Gianluca Caizza, Ruffin White, Victor Mayoral Vilches, Mikael Arguedas"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate’s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures."
}
]
},
"generator": {
"engine": "Robot Vulnerability Database (RVD)"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "high",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/ros2/sros2/issues/282",
"refsource": "CONFIRM",
"url": "https://github.com/ros2/sros2/issues/282"
}
],
"reference_data": [
{
"name": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d",
"refsource": "CONFIRM",
"url": "https://gist.github.com/vmayoral/235c02d0b0ef85a29812eff6980ff80d"
}
]
},
"source": {
"defect": [
"RVD#3346"
],
"discovery": "EXTERNAL"
}
}
}