← Back to CVEs
CVE-2023-43488
HIGH7.9
Description
The vulnerability allows a low privileged (untrusted) application to modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical access through USB.
CVE Details
CVSS v3.1 Score7.9
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published10/25/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
boschrexroth:ctrlx_hmi_web_panel_wr2107boschrexroth:ctrlx_hmi_web_panel_wr2107_firmwareboschrexroth:ctrlx_hmi_web_panel_wr2110boschrexroth:ctrlx_hmi_web_panel_wr2110_firmwareboschrexroth:ctrlx_hmi_web_panel_wr2115boschrexroth:ctrlx_hmi_web_panel_wr2115_firmware
Weaknesses (CWE)
CWE-862CWE-862
References
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html(psirt@bosch.com)
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.