Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2023-40013

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** SVG Loader is a javascript library that fetches SVGs using XMLHttpRequests and injects the SVG code in the tag's place. According to the docs, svg-loader will strip all JS code before injecting the SVG file for security reasons but the input sanitization logic is not sufficient and can be trivially bypassed. This allows an attacker to craft a malicious SVG which can result in Cross-site Scripting (XSS). When trying to sanitize the svg the lib removes event attributes such as `onmouseover`, `onclick` but the list of events is not exhaustive. Any website which uses external-svg-loader and allows its users to provide svg src, upload svg files would be susceptible to stored XSS attack. This issue has been addressed in commit `d3562fc08` which is included in releases from 1.6.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Gravedad CVSS v3.1: MEDIA
Última modificación:
23/08/2023

CVE-2023-38687

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** Svelecte is a flexible autocomplete/select component written in Svelte. Svelecte item names are rendered as raw HTML with no escaping. This allows the injection of arbitrary HTML into the Svelecte dropdown. This can be exploited to execute arbitrary JavaScript whenever a Svelecte dropdown is opened. Item names given to Svelecte appear to be directly rendered as HTML by the default item renderer. This means that any HTML tags in the name are rendered as HTML elements not as text. Note that the custom item renderer shown in https://mskocik.github.io/svelecte/#item-rendering is also vulnerable to the same exploit. Any site that uses Svelecte with dynamically created items either from an external source or from user-created content could be vulnerable to an XSS attack (execution of untrusted JavaScript), clickjacking or any other attack that can be performed with arbitrary HTML injection. The actual impact of this vulnerability for a specific application depends on how trustworthy the sources that provide Svelecte items are and the steps that the application has taken to mitigate XSS attacks. XSS attacks using this vulnerability are mostly mitigated by a Content Security Policy that blocks inline JavaScript. This issue has been addressed in version 3.16.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.<br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
22/08/2023

CVE-2023-21267

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In multiple functions of KeyguardViewMediator.java, there is a possible way to bypass lockdown mode with screen pinning due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Gravedad CVSS v3.1: MEDIA
Última modificación:
03/07/2024

CVE-2023-21269

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In startActivityInner of ActivityStarter.java, there is a possible way to launch an activity into PiP mode from the background due to BAL bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: ALTA
Última modificación:
09/10/2024

CVE-2023-21268

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In update of MmsProvider.java, there is a possible way to change directory permissions due to a path traversal error. This could lead to local denial of service of SIM recognition with no additional execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
15/11/2023

CVE-2023-21265

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In multiple locations, there are root CA certificates which need to be disabled. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: ALTA
Última modificación:
09/10/2024

CVE-2023-21133

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In onCreate of ManagePermissionsActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with physical access to a device that&amp;#39;s been factory reset with no additional execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/10/2024

CVE-2023-21132

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In onCreate of ManagePermissionsActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with physical access to a device that&amp;#39;s been factory reset with no additional execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/10/2024

CVE-2023-21140

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In onCreate of ManagePermissionsActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with physical access to a device that&amp;#39;s been factory reset with no additional execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/10/2024

CVE-2023-21134

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In onCreate of ManagePermissionsActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with physical access to a device that&amp;#39;s been factory reset with no additional execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/10/2024

CVE-2023-21264

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
24/08/2023

CVE-2023-21242

Fecha de publicación:
14/08/2023
Idioma:
Inglés
*** Pendiente de traducción *** In isServerCertChainValid of InsecureEapNetworkHandler.java, there is a possible way to trust an imposter server due to a logic error in the code. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.<br /> <br />
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
24/08/2023