← Retour aux CVEs
CVE-2023-43488
HIGH7.9
Description
The vulnerability allows a low privileged (untrusted) application to modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical access through USB.
Details CVE
Score CVSS v3.17.9
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie10/25/2023
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
boschrexroth:ctrlx_hmi_web_panel_wr2107boschrexroth:ctrlx_hmi_web_panel_wr2107_firmwareboschrexroth:ctrlx_hmi_web_panel_wr2110boschrexroth:ctrlx_hmi_web_panel_wr2110_firmwareboschrexroth:ctrlx_hmi_web_panel_wr2115boschrexroth:ctrlx_hmi_web_panel_wr2115_firmware
Faiblesses (CWE)
CWE-862CWE-862
References
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html(psirt@bosch.com)
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.