{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T13:20:28.374","vulnerabilities":[{"cve":{"id":"CVE-2023-0248","sourceIdentifier":"productsecurity@jci.com","published":"2023-12-14T21:15:07.553","lastModified":"2024-11-21T07:36:49.787","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.07.02 in certain circumstances can recover the reader's communication memory between the card and reader.\n\n"},{"lang":"es","value":"Un atacante con acceso físico al lector de tarjetas Kantech Gen1 ioSmart con versión de firmware anterior a 1.7.2 en determinadas circunstancias puede recuperar la memoria de comunicación del lector entre la tarjeta y el lector."}],"metrics":{"cvssMetricV31":[{"source":"productsecurity@jci.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6}]},"weaknesses":[{"source":"productsecurity@jci.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"},{"lang":"en","value":"CWE-401"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:johnsoncontrols:iosmart_gen_1_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.07.02","matchCriteriaId":"2EAD2797-79E8-4ED4-87EC-914F08698414"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:johnsoncontrols:iosmart_gen_1:-:*:*:*:*:*:*:*","matchCriteriaId":"1FC9CD38-BBD7-4AB8-A7E1-87246BCD7812"}]}]}],"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-02","source":"productsecurity@jci.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.johnsoncontrols.com/cyber-solutions/security-advisories","source":"productsecurity@jci.com","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-02","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.johnsoncontrols.com/cyber-solutions/security-advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}