{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-20T04:50:52.078","vulnerabilities":[{"cve":{"id":"CVE-2023-4463","sourceIdentifier":"cna@vuldb.com","published":"2023-12-29T10:15:11.413","lastModified":"2024-11-21T08:35:13.043","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic was found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument Cookie leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249256."},{"lang":"es","value":"Una vulnerabilidad fue encontrada en Poly CCX 400, CCX 600, Trio 8800 y Trio C60 y clasificada como problemática. Código desconocido del componente HTTP Header Handler es afectado por esta vulnerabilidad. La manipulación del argumento Cookie conduce a la denegación de servicio. El ataque se puede iniciar de forma remota. La explotación ha sido divulgada al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-249256."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-404"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:poly:ccx_400_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"E6EF5E6E-D387-4EB1-A533-C005F76F49E0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:poly:ccx_400:-:*:*:*:*:*:*:*","matchCriteriaId":"74C09FB0-DC34-4F03-8560-B607FB8A5245"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:poly:ccx_600_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"37A9DF12-51BF-4E6A-B753-7481C95F22AD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:poly:ccx_600:-:*:*:*:*:*:*:*","matchCriteriaId":"8F8D61E7-160F-4E4F-8C73-724DFF3F92C2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:poly:trio_8800_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"6307C9DD-572F-44E4-ADCD-205CC1553774"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:poly:trio_8800:-:*:*:*:*:*:*:*","matchCriteriaId":"39862A32-5AF6-41F9-9C25-9D68EB3784DC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:poly:trio_c60_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"3CC00989-4E87-48F1-9EC9-53F0AB4F445C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:poly:trio_c60:-:*:*:*:*:*:*:*","matchCriteriaId":"6CDD2376-BD9D-4B5E-B776-0F627D09E025"}]}]}],"references":[{"url":"https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html","source":"cna@vuldb.com","tags":["Not Applicable"]},{"url":"https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices","source":"cna@vuldb.com"},{"url":"https://modzero.com/en/advisories/mz-23-01-poly-voip/","source":"cna@vuldb.com"},{"url":"https://vuldb.com/?ctiid.249256","source":"cna@vuldb.com","tags":["Permissions Required"]},{"url":"https://vuldb.com/?id.249256","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://modzero.com/en/blog/multiple-vulnerabilities-in-poly-products/","source":"nvd@nist.gov","tags":["Exploit","Third Party Advisory"]},{"url":"https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://modzero.com/en/advisories/mz-23-01-poly-voip/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://vuldb.com/?ctiid.249256","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"https://vuldb.com/?id.249256","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}