{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T01:42:42.009","vulnerabilities":[{"cve":{"id":"CVE-2023-47611","sourceIdentifier":"vulnerability@kaspersky.com","published":"2023-11-10T17:15:07.380","lastModified":"2024-11-21T08:30:31.177","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A CWE-269: Improper Privilege Management vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to elevate privileges to \"manufacturer\" level on the targeted system."},{"lang":"es","value":"Existe una vulnerabilidad CWE-269: Gestión de Privilegios Inadecuada en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podría permitir a un atacante local con pocos privilegios elevar los privilegios al nivel de \"fabricante\" en el sistema de destino."}],"metrics":{"cvssMetricV31":[{"source":"vulnerability@kaspersky.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"vulnerability@kaspersky.com","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"236A82FB-6772-43F5-BFE5-378A6F740A25"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*","matchCriteriaId":"ACE7A300-7A40-49FB-95A3-4F75796A6DB1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"C33F8018-2AA2-4AA2-B97A-FB848F5D1C06"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*","matchCriteriaId":"5E937F19-944A-4D76-AF25-488FD30FABBB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"EEA2FCCD-752B-4DAB-8353-EF1B35AB143F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*","matchCriteriaId":"57219468-C424-43D0-98C0-A85A250AB733"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*","matchCriteriaId":"691F7CF3-B36D-4440-A8A8-A4863FD5E828"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"E1969DA7-72FC-4981-A3D5-A7919AA5D774"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*","matchCriteriaId":"1F563DF9-B922-4FCF-8078-EA354F0ED5B5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"70E71C87-3011-43DB-ADB0-A926C7A8E87A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*","matchCriteriaId":"EB6E32F2-2723-43B9-A730-22BCF9D420B0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"1418767F-34D5-41A0-82BB-BBA7575DD21D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*","matchCriteriaId":"6F08EFD2-855A-498D-B88E-59414317BBFC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"1B580262-9CF7-4FE4-99E6-F3486A498F10"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*","matchCriteriaId":"DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*","matchCriteriaId":"BE8E98E9-4BB6-48E5-89ED-420653101A2C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"A4647F52-2F3E-45F3-BD84-B54950A06AC8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*","matchCriteriaId":"AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF"}]}]}],"references":[{"url":"https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/","source":"vulnerability@kaspersky.com","tags":["Third Party Advisory"]},{"url":"https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}