← Voltar para CVEs
CVE-2023-43488
HIGH7.9
Descricao
The vulnerability allows a low privileged (untrusted) application to modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical access through USB.
Detalhes CVE
Pontuacao CVSS v3.17.9
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado10/25/2023
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
boschrexroth:ctrlx_hmi_web_panel_wr2107boschrexroth:ctrlx_hmi_web_panel_wr2107_firmwareboschrexroth:ctrlx_hmi_web_panel_wr2110boschrexroth:ctrlx_hmi_web_panel_wr2110_firmwareboschrexroth:ctrlx_hmi_web_panel_wr2115boschrexroth:ctrlx_hmi_web_panel_wr2115_firmware
Fraquezas (CWE)
CWE-862CWE-862
Referencias
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html(psirt@bosch.com)
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.