{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T16:13:30.658","vulnerabilities":[{"cve":{"id":"CVE-2023-38324","sourceIdentifier":"cve@mitre.org","published":"2023-11-17T06:15:33.760","lastModified":"2024-11-21T08:13:20.150","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered in OpenNDS before 10.1.2. It allows users to skip the splash page sequence (and directly authenticate) when it is using the default FAS key and OpenNDS is configured as FAS. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."},{"lang":"es","value":"Se descubrió un problema en OpenNDS Captive Portal antes de la versión 10.1.2. Permite a los usuarios omitir la secuencia de la página de presentación cuando usan la clave FAS predeterminada y cuando OpenNDS está configurado como FAS (predeterminado)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:opennds:captive_portal:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1.2","matchCriteriaId":"41C7501E-5FCE-4728-A6DC-9DD6C0468496"}]}]}],"references":[{"url":"https://cwe.mitre.org/data/definitions/1390.html","source":"cve@mitre.org"},{"url":"https://github.com/openNDS/openNDS/blob/master/ChangeLog","source":"cve@mitre.org"},{"url":"https://github.com/openNDS/openNDS/releases/tag/v10.1.2","source":"cve@mitre.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80","source":"cve@mitre.org"},{"url":"https://openwrt.org/docs/guide-user/services/captive-portal/opennds","source":"cve@mitre.org"},{"url":"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs","source":"cve@mitre.org"},{"url":"https://www.forescout.com/resources/sierra21-vulnerabilities","source":"cve@mitre.org"},{"url":"https://cwe.mitre.org/data/definitions/1390.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/openNDS/openNDS/blob/master/ChangeLog","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/openNDS/openNDS/releases/tag/v10.1.2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://openwrt.org/docs/guide-user/services/captive-portal/opennds","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.forescout.com/resources/sierra21-vulnerabilities","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}