Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_WELOTEC_CVE-2023-1082.NASL
HistoryJul 01, 2024 - 12:00 a.m.

Welotec Industrial Routers OS Command Injection (CVE-2023-1082)

2024-07-0100:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
7
welotec industrial routers
os command injection
cve-2023-1082
tenable.ot
firmware v2.3.0.r5542

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.7%

An remote attacker with low privileges can perform a command injection which can lead to root access.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(502287);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/07/02");

  script_cve_id("CVE-2023-1082");

  script_name(english:"Welotec Industrial Routers OS Command Injection (CVE-2023-1082)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"An remote attacker with low privileges can perform a command injection which can lead to root access.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.cvedetails.com/cve/CVE-2023-1082/");
  script_set_attribute(attribute:"solution", value:
"Update the product to firmware v2.3.0.r5542 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_set_cvss3_base_vector("CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-1082");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/04/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/04/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/07/01");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk515l_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk515l-w_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk525l_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk525l-w_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk525u_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk525w_firmare");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:welotec:tk535l1_firmare");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Welotec");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Welotec');

var asset = tenable_ot::assets::get(vendor:'Welotec');

var vuln_cpes = {
    "cpe:/o:welotec:tk515l_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk515l-w_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk525l_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk525l-w_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk525u_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk525w_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"},
    "cpe:/o:welotec:tk535l1_firmare" :
        {"versionEndExcluding" : "2.3.0.r5542", "family" : "WelotecIndustrialRouters"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
welotectk525u_firmarecpe:/o:welotec:tk525u_firmare
welotectk535l1_firmarecpe:/o:welotec:tk535l1_firmare
welotectk525l_firmarecpe:/o:welotec:tk525l_firmare
welotectk515l-w_firmarecpe:/o:welotec:tk515l-w_firmare
welotectk525w_firmarecpe:/o:welotec:tk525w_firmare
welotectk525l-w_firmarecpe:/o:welotec:tk525l-w_firmare
welotectk515l_firmarecpe:/o:welotec:tk515l_firmare

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.7%

Related for TENABLE_OT_WELOTEC_CVE-2023-1082.NASL