U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-35803

Change History

Initial Analysis by NIST 10/10/2023 4:04:36 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:* versions up to (excluding) 10.6r2
     OR
          cpe:2.3:h:extremenetworks:ap3000:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap3000x:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap302w:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap305c:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap305c-1:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap305cx:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap4000:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap4000-1:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap410c:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap410c-1:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap460c:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap460s12c:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap460s6c:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap5010:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap5050d:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap5050u:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap510c:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap510cx:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap630:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap650:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap650x:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:* versions up to (excluding) 10.6r5
     OR
          cpe:2.3:h:extremenetworks:ap1130:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap122:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap130:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap150w:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap250:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap30:-:*:*:*:*:*:*:*
          cpe:2.3:h:extremenetworks:ap550:-:*:*:*:*:*:*:*
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-120
Changed Reference Type
https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472 No Types Assigned
https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472 Vendor Advisory