{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T16:54:35.680","vulnerabilities":[{"cve":{"id":"CVE-2023-1968","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2023-04-28T19:15:16.647","lastModified":"2024-11-21T07:40:14.970","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nInstruments with Illumina Universal Copy Service v2.x are vulnerable due to binding to an unrestricted IP address. An unauthenticated malicious actor could use UCS to listen on all IP addresses, including those capable of accepting remote communications. \n\n\n\n\n\n\n\n"}],"metrics":{"cvssMetricV31":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-1327"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:iscan_firmware:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"B5000279-D40B-4526-B911-9E0641736EE1"},{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:iscan_firmware:4.0.5:*:*:*:*:*:*:*","matchCriteriaId":"BD7BE281-02B5-4B87-A7E2-D0E3BB5309CF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:iscan:-:*:*:*:*:*:*:*","matchCriteriaId":"08732A94-734B-486E-AB2C-A2E2CA3C66AE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:iseq_100_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"D22304CE-8F36-4B51-BAA2-E2C564C04CDF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:iseq_100:-:*:*:*:*:*:*:*","matchCriteriaId":"0136ED72-BF05-404D-910A-DA5B73F69771"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:miniseq_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","matchCriteriaId":"E4B7C1F7-D185-4C72-B23C-A21103267CD6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:miniseq:-:*:*:*:*:*:*:*","matchCriteriaId":"2DA69772-E795-4A64-A6A1-0BDD503D263B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:miseq_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","matchCriteriaId":"CC028805-6ED3-455B-8F4C-95A8B8C5E756"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:miseq:-:*:*:*:*:*:*:*","matchCriteriaId":"8AFB0D5A-AF5A-4A84-963F-C6307ADCFF4E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:miseqdx_firmware:*:*:*:*:-:*:*:*","versionStartIncluding":"4.0.1","matchCriteriaId":"E97A49E3-4B87-4FE5-8FD4-5B36C61A0650"},{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:miseqdx_firmware:4.0:*:*:*:ruo:*:*:*","matchCriteriaId":"BE1CBD4E-42B1-42C6-9B3F-4F715A5DBF6D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:miseqdx:-:*:*:*:*:*:*:*","matchCriteriaId":"CBD56D9E-B16C-4ED4-A2E4-E73A3A9A599B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:nextseq_500_firmware:4.0:*:*:*:*:*:*:*","matchCriteriaId":"22E34BB5-591C-4889-851E-9A66212C8B8C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:nextseq_500:-:*:*:*:*:*:*:*","matchCriteriaId":"1C7AEA5A-707D-4BF4-9DF6-BDE6E6D97B60"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:nextseq_550_firmware:4.0:*:*:*:*:*:*:*","matchCriteriaId":"D0D02B5D-7E8A-41CD-BE27-5B012BE5C016"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:nextseq_550:-:*:*:*:*:*:*:*","matchCriteriaId":"BF742B4D-0FC5-443A-8040-7B0A1B298707"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:nextseq_550dx_firmware:*:*:*:*:-:*:*:*","versionStartIncluding":"1.0.0","versionEndIncluding":"1.3.1","matchCriteriaId":"93DC004D-271D-4075-9828-E88CD7FFC403"},{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:nextseq_550dx_firmware:*:*:*:*:-:*:*:*","versionStartIncluding":"1.3.3","matchCriteriaId":"E199B789-BF31-40AC-B15E-31A97257002B"},{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:nextseq_550dx_firmware:4.0:*:*:*:ruo:*:*:*","matchCriteriaId":"78D581A6-38A5-4F0A-A5CB-B25A9337EE78"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:nextseq_550dx:-:*:*:*:*:*:*:*","matchCriteriaId":"B3D5AB9D-7EAA-45F2-A10F-A2D142B20D3D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:nextseq_1000_firmware:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"94B82675-AA38-4584-82BD-9C376F80EA49"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:nextseq_1000:-:*:*:*:*:*:*:*","matchCriteriaId":"93589C3C-F577-4C67-962F-166E28911ED2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:nextseq_2000_firmware:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"6671E6F8-85D5-4970-98FE-6189C8F98852"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:nextseq_2000:-:*:*:*:*:*:*:*","matchCriteriaId":"753D8FDF-5D25-46B9-8E66-30FB8E8A9A87"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:novaseq_6000_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.7","matchCriteriaId":"3A429D26-AF22-4AC2-AB02-76C72B9B9B05"},{"vulnerable":true,"criteria":"cpe:2.3:o:illumina:novaseq_6000_firmware:1.8:*:*:*:*:*:*:*","matchCriteriaId":"B4C702B1-4BAD-4E32-9659-D9F5C3F2F922"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:illumina:novaseq_6000:-:*:*:*:*:*:*:*","matchCriteriaId":"0D879686-89E7-4152-AEF9-DC8A33FDA4A5"}]}]}],"references":[{"url":"https://support.illumina.com/downloads/illumina-universal-copy-service-1-0.html","source":"ics-cert@hq.dhs.gov","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-117-01","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://support.illumina.com/downloads/illumina-universal-copy-service-1-0.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-117-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}