Vulnerability Details CVE-2023-3259
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 37.0%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2023-3259
-
cpe:2.3:h:dataprobe:iboot-pdu4-c20:-
-
cpe:2.3:h:dataprobe:iboot-pdu4-n20:-
-
cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-
-
cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-
-
cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-
-
cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-
-
cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-
-
cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-
-
cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-
-
cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-
-
cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-
-
cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-
-
cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-
-
cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-
-
cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-
-
cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-
-
cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-
-
cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-
-
cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-
-
cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-
-
cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-
-
cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-
-
cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:1.42.06162022
-
cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:-
-
cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:1.42.06162022