Lucene search

K
cvelistASRGCVELIST:CVE-2023-6248
HistoryNov 21, 2023 - 9:49 p.m.

CVE-2023-6248 Data leakage and arbitrary remote code execution in Syrus cloud devices

2023-11-2121:49:35
CWE-287
CWE-94
CWE-200
CWE-319
ASRG
www.cve.org
data leakage
remote code execution
syrus4
mqtt server
unauthenticated attacker
location data
can bus messages
safe-immobilizer module
video camera
audio messages

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.3%

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations:

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "Cloud Management System",
      "Telematics Gateway"
    ],
    "platforms": [
      "ARM",
      "Linux"
    ],
    "product": "Syrus4 IoT Telematics Gateway",
    "vendor": "Digital Communications Technologies",
    "versions": [
      {
        "status": "affected",
        "version": "apex-23.43.2"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.3%

Related for CVELIST:CVE-2023-6248