{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T01:27:38.789","vulnerabilities":[{"cve":{"id":"CVE-2023-41967","sourceIdentifier":"disclosures@gallagher.com","published":"2023-12-18T22:15:08.770","lastModified":"2024-11-21T08:22:00.680","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nSensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller's default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages. \n\nThis issue affects: Gallagher Controller 6000 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), v8.60 or earlier.\n\n\n"},{"lang":"es","value":"Un atacante con conocimiento de la contraseña de diagnóstico predeterminada de Controller 6000 y acceso físico al Controlador para ver su configuración a través de las páginas web de diagnóstico podría abusar de la información confidencial no borrada después de la transición del estado de depuración/encendido en el Controlador. Este problema afecta a: Gallagher Controller 6000 8.70 anterior a vCR8.70.231204a (distribuido en 8.70.2375 (MR5)), v8.60 o anterior."}],"metrics":{"cvssMetricV31":[{"source":"disclosures@gallagher.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":2.4,"baseSeverity":"LOW","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":3.6}]},"weaknesses":[{"source":"disclosures@gallagher.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1272"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-212"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"8.60","matchCriteriaId":"E5B756DF-6D8A-4B89-9DAB-3EBD00C75E3A"},{"vulnerable":true,"criteria":"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"8.70","versionEndExcluding":"8.70.231204a","matchCriteriaId":"30EEB0FF-D2F2-47DA-9666-6532730B195F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*","matchCriteriaId":"5AF2B03B-B033-439F-8CEE-334FA8053278"}]}]}],"references":[{"url":"https://security.gallagher.com/Security-Advisories/CVE-2023-41967","source":"disclosures@gallagher.com","tags":["Vendor Advisory"]},{"url":"https://security.gallagher.com/Security-Advisories/CVE-2023-41967","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}