Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2023-31634 | First vendor Publication | 2024-03-27 |
Vendor | Cve | Last vendor Modification | 2024-08-02 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In TeslaMate before 1.27.2, there is unauthorized access to port 4000 for remote viewing and operation of user data. After accessing the IP address for the TeslaMate instance, an attacker can switch the port to 3000 to enter Grafana for remote operations. At that time, the default username and password can be used to enter the Grafana management console without logging in, a related issue to CVE-2022-23126. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31634 |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-08-02 21:27:44 |
|
2024-03-28 02:44:06 |
|
2024-03-28 02:37:30 |
|
2024-03-27 17:27:26 |
|
2024-03-27 13:27:27 |
|