← Back to CVEs
CVE-2023-2588
HIGH8.8
Description
Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published5/22/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
teltonika:remote_management_system
Weaknesses (CWE)
CWE-830
References
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08(ics-cert@hq.dhs.gov)
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.