8.1
HIGH
CVE-2023-4606
Lenovo ThinkSystem XCC Password Modification березня
Description

An authenticated XCC user with Read-Only permission can change a different user’s password through a crafted API command.   This affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected.

INFO

Published Date :

Oct. 25, 2023, 6:17 p.m.

Last Modified :

Nov. 7, 2023, 7:11 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.2

Exploitability Score :

2.8
Affected Products

The following products are affected by CVE-2023-4606 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Lenovo thinkagile_hx5530_firmware
2 Lenovo thinkagile_hx7530_firmware
3 Lenovo thinkagile_vx3331_firmware
4 Lenovo thinkagile_hx1331_firmware
5 Lenovo thinkagile_hx2330_firmware
6 Lenovo thinkagile_hx2331_firmware
7 Lenovo thinkagile_hx3330_firmware
8 Lenovo thinkagile_hx3331_firmware
9 Lenovo thinkagile_hx3375_firmware
10 Lenovo thinkagile_hx3376_firmware
11 Lenovo thinkagile_hx5531_firmware
12 Lenovo thinkagile_hx7531_firmware
13 Lenovo thinkagile_vx2330_firmware
14 Lenovo thinkagile_vx3330_firmware
15 Lenovo thinkagile_vx3530-g_firmware
16 Lenovo thinkagile_vx5530_firmware
17 Lenovo thinkagile_vx7330_firmware
18 Lenovo thinkagile_vx7530_firmware
19 Lenovo thinkagile_vx7531_firmware
20 Lenovo thinksystem_sd630_v2_firmware
21 Lenovo thinksystem_sd650_v2_firmware
22 Lenovo thinksystem_sd650-n_v2_firmware
23 Lenovo thinksystem_sn550_v2_firmware
24 Lenovo thinksystem_sr250_firmware
25 Lenovo thinksystem_sr258_v2_firmware
26 Lenovo thinksystem_sr630_v2_firmware
27 Lenovo thinksystem_sr645_firmware
28 Lenovo thinksystem_sr645_v3_firmware
29 Lenovo thinksystem_sr650_v2_firmware
30 Lenovo thinksystem_sr665_firmware
31 Lenovo thinksystem_sr665_v3_firmware
32 Lenovo thinksystem_sr670_firmware
33 Lenovo thinksystem_sr670_v2_firmware
34 Lenovo thinksystem_sr850_v2_firmware
35 Lenovo thinksystem_sr860_v2_firmware
36 Lenovo thinksystem_st250_v2_firmware
37 Lenovo thinksystem_st258_v2_firmware
38 Lenovo thinksystem_st650_v2_firmware
39 Lenovo thinksystem_st658_v2_firmware
40 Lenovo thinkagile_mx3330-f_all-flash_firmware
41 Lenovo thinkagile_mx3330-h_hybrid_firmware
42 Lenovo thinkagile_mx3331-f_all-flash_firmware
43 Lenovo thinkagile_mx3331-h_hybrid_firmware
44 Lenovo thinkagile_mx3530_f_all_flash_firmware
45 Lenovo thinkagile_mx3530-h_hybrid_firmware
46 Lenovo thinkagile_mx3531_h_hybrid_firmware
47 Lenovo thinkagile_mx3531-f_all-flash_firmware
48 Lenovo thinksystem_sd650_v3_firmware
49 Lenovo thinksystem_sd665_v3_firmware
50 Lenovo thinksystem_sr630_v3_firmware
51 Lenovo thinksystem_sr635_v3_firmware
52 Lenovo thinksystem_sr650_v3_firmware
53 Lenovo thinksystem_sr655_v3_firmware
54 Lenovo thinksystem_sr675_v3_firmware
55 Lenovo thinksystem_sr850_v3_firmware
56 Lenovo thinksystem_sr860_v3_firmware
57 Lenovo thinksystem_st650_v3_firmware
58 Lenovo thinksystem_st658_v3_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-4606.

URL Resource
https://support.lenovo.com/us/en/product_security/LEN-140960 Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-4606 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-4606 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
    Changed Reference Type https://support.lenovo.com/us/en/product_security/LEN-140960 No Types Assigned https://support.lenovo.com/us/en/product_security/LEN-140960 Vendor Advisory
    Added CWE NIST CWE-862
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_mx3330-f_all-flash_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_mx3330-f_all-flash:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_mx3330-h_hybrid_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_mx3330-h_hybrid:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_mx3331-f_all-flash_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_mx3331-f_all-flash:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_mx3331-h_hybrid_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_mx3331-h_hybrid:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_mx3530_f_all_flash_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_mx3530_f_all_flash:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_mx3530-h_hybrid_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_mx3530-h_hybrid:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_mx3531_h_hybrid_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_mx3531_h_hybrid:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_mx3531-f_all-flash_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_mx3531-f_all-flash:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sd650_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sd665_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sr630_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sr635_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr645_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr645_v3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sr650_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sr655_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr665_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr670_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sr675_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sr850_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_sr860_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_st650_v3_firmware:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:lenovo:thinksystem_st658_v3_firmware:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-4606 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-4606 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.05 }} 0.00%

score

0.13216

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability