Lucene search

K
cvelistIcscertCVELIST:CVE-2023-32348
HistoryMay 22, 2023 - 3:02 p.m.

CVE-2023-32348

2023-05-2215:02:56
CWE-918
icscert
www.cve.org
teltonika
openvpn
vulnerability
unauthorized access
connected devices

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

5.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.4%

Teltonika’s Remote Management System versions prior to 4.10.0 contain a virtual private network (VPN) hub feature for cross-device communication that uses OpenVPN. It connects new devices in a manner that allows the new device to communicate with all Teltonika devices connected to the VPN. The OpenVPN server also allows users to route through it. An attacker could route a connection to a remote server through the OpenVPN server, enabling them to scan and access data from other Teltonika devices connected to the VPN.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Remote Management System",
    "vendor": "Teltonika",
    "versions": [
      {
        "lessThan": "4.10.0",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

5.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.4%

Related for CVELIST:CVE-2023-32348