{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T06:56:03.506","vulnerabilities":[{"cve":{"id":"CVE-2023-47612","sourceIdentifier":"vulnerability@kaspersky.com","published":"2023-11-09T12:15:07.520","lastModified":"2024-11-21T08:30:31.357","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories."},{"lang":"es","value":"Existe una vulnerabilidad CWE-552: Archivos o Directorios Accesibles a Partes Externas en Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 que podría permitir que un atacante con acceso físico al sistema de destino para obtener acceso de lectura/escritura a cualquier archivo y directorio en el sistema de destino, incluidos archivos y directorios ocultos."}],"metrics":{"cvssMetricV31":[{"source":"vulnerability@kaspersky.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":5.2}]},"weaknesses":[{"source":"vulnerability@kaspersky.com","type":"Secondary","description":[{"lang":"en","value":"CWE-552"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-552"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"236A82FB-6772-43F5-BFE5-378A6F740A25"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*","matchCriteriaId":"ACE7A300-7A40-49FB-95A3-4F75796A6DB1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"C33F8018-2AA2-4AA2-B97A-FB848F5D1C06"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*","matchCriteriaId":"5E937F19-944A-4D76-AF25-488FD30FABBB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"EEA2FCCD-752B-4DAB-8353-EF1B35AB143F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*","matchCriteriaId":"57219468-C424-43D0-98C0-A85A250AB733"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"4C74BE72-65CB-4DF3-8AE3-EBCFCD640BFD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*","matchCriteriaId":"691F7CF3-B36D-4440-A8A8-A4863FD5E828"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"E1969DA7-72FC-4981-A3D5-A7919AA5D774"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*","matchCriteriaId":"1F563DF9-B922-4FCF-8078-EA354F0ED5B5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"70E71C87-3011-43DB-ADB0-A926C7A8E87A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*","matchCriteriaId":"EB6E32F2-2723-43B9-A730-22BCF9D420B0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"1418767F-34D5-41A0-82BB-BBA7575DD21D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*","matchCriteriaId":"6F08EFD2-855A-498D-B88E-59414317BBFC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"1B580262-9CF7-4FE4-99E6-F3486A498F10"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*","matchCriteriaId":"DEEA5EE5-4F4A-4684-A15E-13AD8D553D3B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"AAAC546F-9F47-4AFC-93EF-9261BFCE9ECB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*","matchCriteriaId":"BE8E98E9-4BB6-48E5-89ED-420653101A2C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"A4647F52-2F3E-45F3-BD84-B54950A06AC8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*","matchCriteriaId":"AF3DBFD6-1C3D-4A8B-B458-E85DE4AF86BF"}]}]}],"references":[{"url":"https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/","source":"vulnerability@kaspersky.com","tags":["Third Party Advisory"]},{"url":"https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}