Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:lg:webos:4.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "9031E807-64B7-4F69-A0AB-AEBA15E2B170", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:lg:lg43um7000pla:-:*:*:*:*:*:*:*", "matchCriteriaId": "599F9815-2644-46A5-B0FE-00F6D119CED0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:lg:webos:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "60222A18-12F9-4A88-8F06-FB7C5EC8B453", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:lg:oled55cxpua:-:*:*:*:*:*:*:*", "matchCriteriaId": "8735748A-192A-4CBD-A596-1604940B9F3D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:lg:webos:6.3.3-442:*:*:*:*:*:*:*", "matchCriteriaId": "E5BAD119-46CA-4E42-9976-CE33CBBFE00A", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:lg:oled48c1pub:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CD5B994-8D07-49D5-967C-9C7DFD9DABFD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:lg:webos:7.3.1-43:*:*:*:*:*:*:*", "matchCriteriaId": "4D024759-5D9D-405A-9BB7-8F8FEE904100", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:lg:oled55a23la:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4C787C-2EC8-4D3E-B3CA-49472E638A68", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "A prompt bypass exists in the secondscreen.gateway service running on webOS version 4 through 7. An attacker can create a privileged account without asking the user for the security PIN.\u00a0\n\nFull versions and TV models affected:\n\nwebOS 4.9.7 - 5.30.40 running on LG43UM7000PLA \nwebOS 5.5.0 - 04.50.51 running on OLED55CXPUA \nwebOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB \u00a0\nwebOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA \n"}, {"lang": "es", "value": "Existe una omisi\u00f3n r\u00e1pida en el servicio secondscreen.gateway que se ejecuta en webOS versi\u00f3n 4 a 7. Un atacante puede crear una cuenta privilegiada sin pedirle al usuario el PIN de seguridad. Versiones completas y modelos de TV afectados: webOS 4.9.7 - 5.30.40 ejecut\u00e1ndose en LG43UM7000PLA webOS 5.5.0 - 04.50.51 ejecut\u00e1ndose en OLED55CXPUA webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 ejecut\u00e1ndose en OLED48C1PUB webOS 7.3. 1-43 (mullet-mebin) - 33.03.85 ejecut\u00e1ndose en OLED55A23LA"}], "id": "CVE-2023-6317", "lastModified": "2025-02-07T18:39:59.897", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 2.7, "source": "cve-requests@bitdefender.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2024-04-09T14:15:07.683", "references": [{"source": "cve-requests@bitdefender.com", "tags": ["Exploit", "Third Party Advisory"], "url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/"}, {"source": "cve-requests@bitdefender.com", "tags": ["Vendor Advisory"], "url": "https://lgsecurity.lge.com/bulletins/tv#updateDetails"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://lgsecurity.lge.com/bulletins/tv#updateDetails"}], "sourceIdentifier": "cve-requests@bitdefender.com", "vulnStatus": "Analyzed", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-639"}], "source": "cve-requests@bitdefender.com", "type": "Secondary"}]}