{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:50:20.603","vulnerabilities":[{"cve":{"id":"CVE-2023-3768","sourceIdentifier":"cve-coordination@incibe.es","published":"2023-10-02T11:15:50.213","lastModified":"2024-11-21T08:18:01.240","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services."},{"lang":"es","value":"Vulnerabilidad de validación de entrada de datos incorrecta, que podría permitir a un atacante con acceso a la red implementar técnicas de fuzzing que le permitirían obtener conocimiento sobre paquetes especialmente manipulados que crearían una condición DoS a través del protocolo MMS al iniciar la comunicación, logrando un reinicio completo del sistema del dispositivo y sus servicios."}],"metrics":{"cvssMetricV31":[{"source":"cve-coordination@incibe.es","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve-coordination@incibe.es","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ingeteam:ingepac_da3451_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"AB38E74A-28BC-4EA4-B8C1-EFCD09AEC8BE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ingeteam:ingepac_da3451:-:*:*:*:*:*:*:*","matchCriteriaId":"6DD52223-F39F-4012-8CF2-55E3404CD410"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ingeteam:ingepac_ef_md_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"59BCB6DD-B431-4027-ABAA-03AE042BC1E0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ingeteam:ingepac_ef_md:-:*:*:*:*:*:*:*","matchCriteriaId":"EF9F2C3C-C4C4-4A40-8E8B-6FC0B462DD9B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ingeteam:ingepac_fc5066_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"B8135BC2-79BA-4FCD-8EDF-05E8C5CBF142"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ingeteam:ingepac_fc5066:-:*:*:*:*:*:*:*","matchCriteriaId":"DB41D719-A8E1-4D91-8998-FF36D7E5D5FF"}]}]}],"references":[{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products","source":"cve-coordination@incibe.es","tags":["Third Party Advisory"]},{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}