Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-29065


The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.


Published

2023-11-28T21:15:07.990

Last Modified

2024-11-21T07:56:29.387

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.1 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-277
  • Type: Primary
    CWE-732

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application bd facschorus 5.0 Yes
Application bd facschorus 5.1 Yes
Hardware hp hp_z2_tower_g9 - No
Application bd facschorus 3.0 Yes
Application bd facschorus 3.1 Yes
Hardware hp hp_z2_tower_g5 - No

References