Vulnerability Details CVE-2023-23912
A vulnerability, found in EdgeRouters Version 2.0.9-hotfix.5 and earlier and UniFi Security Gateways (USG) Version 4.4.56 and earlier with their DHCPv6 prefix delegation set to dhcpv6-stateless or dhcpv6-stateful, allows a malicious actor directly connected to the WAN interface of an affected device to create a remote code execution vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.017
EPSS Ranking 81.4%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2023-23912
-
-
-
-
-
-
-
-
-
-
-
cpe:2.3:o:ui:er-10x_firmware:*
-
cpe:2.3:o:ui:er-10x_firmware:2.0.9
-
cpe:2.3:o:ui:er-12_firmware:-
-
cpe:2.3:o:ui:er-12_firmware:2.0.0
-
cpe:2.3:o:ui:er-12_firmware:2.0.1
-
cpe:2.3:o:ui:er-12_firmware:2.0.2
-
cpe:2.3:o:ui:er-12_firmware:2.0.3
-
cpe:2.3:o:ui:er-12_firmware:2.0.9
-
cpe:2.3:o:ui:er-12p_firmware:*
-
cpe:2.3:o:ui:er-12p_firmware:2.0.9
-
cpe:2.3:o:ui:er-4_firmware:-
-
cpe:2.3:o:ui:er-4_firmware:2.0.0
-
cpe:2.3:o:ui:er-4_firmware:2.0.1
-
cpe:2.3:o:ui:er-4_firmware:2.0.2
-
cpe:2.3:o:ui:er-4_firmware:2.0.3
-
cpe:2.3:o:ui:er-4_firmware:2.0.9
-
cpe:2.3:o:ui:er-6p_firmware:-
-
cpe:2.3:o:ui:er-6p_firmware:2.0.0
-
cpe:2.3:o:ui:er-6p_firmware:2.0.1
-
cpe:2.3:o:ui:er-6p_firmware:2.0.2
-
cpe:2.3:o:ui:er-6p_firmware:2.0.3
-
cpe:2.3:o:ui:er-6p_firmware:2.0.9
-
cpe:2.3:o:ui:er-8-xg_firmware:-
-
cpe:2.3:o:ui:er-8-xg_firmware:2.0.0
-
cpe:2.3:o:ui:er-8-xg_firmware:2.0.1
-
cpe:2.3:o:ui:er-8-xg_firmware:2.0.2
-
cpe:2.3:o:ui:er-8-xg_firmware:2.0.3
-
cpe:2.3:o:ui:er-8-xg_firmware:2.0.9
-
cpe:2.3:o:ui:er-x-sfp_firmware:-
-
cpe:2.3:o:ui:er-x-sfp_firmware:2.0.0
-
cpe:2.3:o:ui:er-x-sfp_firmware:2.0.1
-
cpe:2.3:o:ui:er-x-sfp_firmware:2.0.2
-
cpe:2.3:o:ui:er-x-sfp_firmware:2.0.3
-
cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9
-
cpe:2.3:o:ui:er-x_firmware:-
-
cpe:2.3:o:ui:er-x_firmware:2.0.0
-
cpe:2.3:o:ui:er-x_firmware:2.0.1
-
cpe:2.3:o:ui:er-x_firmware:2.0.2
-
cpe:2.3:o:ui:er-x_firmware:2.0.3
-
cpe:2.3:o:ui:er-x_firmware:2.0.9
-
cpe:2.3:o:ui:usg-pro-4_firmware:*
-
cpe:2.3:o:ui:usg_firmware:*