Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior use a proprietary local area network (LAN) protocol that does not verify updates to the device. An attacker could upload a malformed update file to the device and execute arbitrary code. 
                
            References
                    | Link | Resource | 
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-03 | Third Party Advisory US Government Resource | 
| https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-03 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 07:44
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | () https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-03 - Third Party Advisory, US Government Resource | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.7 | 
31 Jan 2023, 13:49
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-01-30 22:15
Updated : 2024-11-21 07:44
NVD link : CVE-2023-22315
Mitre link : CVE-2023-22315
CVE.ORG link : CVE-2023-22315
JSON object : View
Products Affected
                snapav
- wattbox_wb-300-ip-3_firmware
- wattbox_wb-300-ip-3
CWE
                
                    
                        
                        CWE-345
                        
            Insufficient Verification of Data Authenticity
