U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-42129

Change History

Initial Analysis by NIST 8/18/2025 11:31:57 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:-:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p4:sp1:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p12:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p11:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p1:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p2:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p3:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p5:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p6:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p7:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p8:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p9:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p10:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:-:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p1:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p2:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p3:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.2
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p8:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p4:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p5:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p6:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p7:*:*:*:*:*:*
          *cpe:2.3:o:a10networks:advanced_core_operating_system:*:*:*:*:*:*:*:* versions from (including) 5.1.0 up to (excluding) 5.2.1
     OR
          cpe:2.3:h:a10networks:thunder_application_delivery_controller:-:*:*:*:*:*:*:*
Added Reference Type

								
							
							
						
CVE: https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/ Types: Exploit, Vendor Advisory
Added Reference Type

								
							
							
						
CVE: https://www.zerodayinitiative.com/advisories/ZDI-23-1495/ Types: Third Party Advisory
Added Reference Type

								
							
							
						
Zero Day Initiative: https://support.a10networks.com/support/security_advisory/a10-acos-file-access-vulnerability/ Types: Exploit, Vendor Advisory
Added Reference Type

								
							
							
						
Zero Day Initiative: https://www.zerodayinitiative.com/advisories/ZDI-23-1495/ Types: Third Party Advisory