Skip to content

Commit 65f5f91

Browse files
Merge pull request #287 from arduino/security-bulletin
Arduino Security Bulletins [HC-1400]
2 parents 41fb9ee + 927036a commit 65f5f91

File tree

2 files changed

+54
-1
lines changed

2 files changed

+54
-1
lines changed

content/About Arduino/My Arduino Account/About-security-vulnerabilities-in-Apache-Log4j.md renamed to content/About Arduino/Arduino Security Bulletins/ASEC-21-001-Vulnerabilities-in-Apache-Log4j.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "About security vulnerabilities in Apache Log4j"
2+
title: "ASEC-21-001 – Vulnerabilities in Apache Log4j"
33
id: 4412377144338
44
---
55

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: "ASEC-23-001 - Vulnerabilities in Arduino Create Agent 1.3.2"
3+
---
4+
5+
Bulletin ID: ASEC-23-001
6+
Date: Oct 18, 2023
7+
Product/Component: Arduino Create Agent
8+
Affected versions: <= 1.3.2
9+
Fixed version: 1.3.3
10+
11+
## Summary
12+
13+
This security bulletin provides information on a series of security vulnerabilities that have been identified in the Arduino Create Agent version 1.3.2 and below.
14+
15+
Details on the security vulnerabilities and related advisories can be found below. The vulnerabilities were identified by Nozomi Networks Labs and promptly fixed by Arduino.
16+
17+
### High risk
18+
19+
* [CVE-2023-43802](https://www.cve.org/CVERecord?id=CVE-2023-43802) : Path Traversal (CWE-35), CVSS v3.1 Base Score 7.3 (CVSS:3.1/A
20+
21+
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)
22+
23+
* [CVE-2023-43800](https://www.cve.org/CVERecord?id=CVE-2023-43800): Insufficient Verification of Data Authenticity (CWE-345), CVSS v3.1 Base Score 7.3 (CVSS:3.1/
24+
25+
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)
26+
27+
### Medium risk
28+
29+
* [CVE-2023-43801](https://www.cve.org/CVERecord?id=CVE-2023-43801): Path Traversal (CWE-35), CVSS v3.1 Base Score 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)
30+
* [CVE-2023-43803](https://www.cve.org/CVERecord?id=CVE-2023-43803): Path Traversal (CWE-35), CVSS v3.1 Base Score 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)
31+
32+
## Impact
33+
34+
The identified vulnerabilities may allow an attacker, with local access to the victim machine, the following actions:
35+
36+
* Escalation of privileges to that of a user with credentials for the Arduino Create Agent service;
37+
* Arbitrary code execution with the permissions of the user running the Arduino Create Agent service;
38+
* Arbitrary file deletion of files accessible by the user running the Arduino Create Agent service.
39+
40+
## Action Required
41+
42+
All users are advised to update the Arduino Create Agent to version 1.3.3 or later. An update is automatically initiated when visiting the Arduino Web Editor or when setting up a new device via the Arduino IoT Cloud. Alternatively, a manual update can be performed by downloading the new version of the software [here](https://github.com/arduino/arduino-create-agent/releases).
43+
44+
## Additional information
45+
46+
* [Security Advisory - Path Traversal](https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-75j7-w798-cwwx) (CWE-35)
47+
* [Security Advisory - Insufficient Verification of Data Authenticity](https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-4x5q-q7wc-q22p) (CWE-345)
48+
* [Security Advisory - Path Traversal](https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-mjq6-pv9c-qppq) (CWE-35)
49+
* [Security Advisory - Path Traversal](https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-m5jc-r4gf-c6p8) (CWE-35)
50+
51+
## Contact
52+
53+
If you encounter any issues or have questions regarding this security update, please contact our security team at [security@arduino.cc](mailto:security@arduino.cc).

0 commit comments

Comments
 (0)