Lucene search

K
cve[email protected]CVE-2023-6248
HistoryNov 21, 2023 - 10:15 p.m.

CVE-2023-6248

2023-11-2122:15:08
CWE-287
CWE-200
CWE-94
CWE-319
web.nvd.nist.gov
21
syrus4
iot
gateway
mqtt
server
unsecured
remote code execution
data leakage
cve-2023-6248

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.3%

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations:

Affected configurations

NVD
Node
digitalcomtechsyrus_4g_iot_telematics_gateway_firmwareMatchapex-23.43.2
AND
digitalcomtechsyrus_4g_iot_telematics_gatewayMatch-

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "Cloud Management System",
      "Telematics Gateway"
    ],
    "platforms": [
      "ARM",
      "Linux"
    ],
    "product": "Syrus4 IoT Telematics Gateway",
    "vendor": "Digital Communications Technologies",
    "versions": [
      {
        "status": "affected",
        "version": "apex-23.43.2"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.3%

Related for CVE-2023-6248