Lucene search

K
nvd[email protected]NVD:CVE-2023-6248
HistoryNov 21, 2023 - 10:15 p.m.

CVE-2023-6248

2023-11-2122:15:08
CWE-200
CWE-319
CWE-94
CWE-287
web.nvd.nist.gov
2
syrus4
iot gateway
mqtt server
remote code execution
data leakage
unsecured
remote attacker
location data
can bus messages
vehicle immobilization
live video
audio messages

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

55.2%

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations:

Affected configurations

Nvd
Node
digitalcomtechsyrus_4g_iot_telematics_gateway_firmwareMatchapex-23.43.2
AND
digitalcomtechsyrus_4g_iot_telematics_gatewayMatch-
VendorProductVersionCPE
digitalcomtechsyrus_4g_iot_telematics_gateway_firmwareapex-23.43.2cpe:2.3:o:digitalcomtech:syrus_4g_iot_telematics_gateway_firmware:apex-23.43.2:*:*:*:*:*:*:*
digitalcomtechsyrus_4g_iot_telematics_gateway-cpe:2.3:h:digitalcomtech:syrus_4g_iot_telematics_gateway:-:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

55.2%

Related for NVD:CVE-2023-6248