Lucene search

K
cve[email protected]CVE-2023-27917
HistoryApr 11, 2023 - 9:15 a.m.

CVE-2023-27917

2023-04-1109:15:08
CWE-78
web.nvd.nist.gov
18
cve-2023-27917
os command injection
conprosys iot gateway
remote attacker
root privilege

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.5%

OS command injection vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker who can access Network Maintenance page to execute arbitrary OS commands with a root privilege. The affected products and versions are as follows: M2M Gateway with the firmware Ver.3.7.10 and earlier (CPS-MG341-ADSC1-111, CPS-MG341-ADSC1-931, CPS-MG341G-ADSC1-111, CPS-MG341G-ADSC1-930, and CPS-MG341G5-ADSC1-931), M2M Controller Integrated Type with firmware Ver.3.7.6 and earlier versions (CPS-MC341-ADSC1-111, CPS-MC341-ADSC1-931, CPS-MC341-ADSC2-111, CPS-MC341G-ADSC1-110, CPS-MC341Q-ADSC1-111, CPS-MC341-DS1-111, CPS-MC341-DS11-111, CPS-MC341-DS2-911, and CPS-MC341-A1-111), and M2M Controller Configurable Type with firmware Ver.3.8.8 and earlier versions (CPS-MCS341-DS1-111, CPS-MCS341-DS1-131, CPS-MCS341G-DS1-130, CPS-MCS341G5-DS1-130, and CPS-MCS341Q-DS1-131).

Affected configurations

NVD
Node
conteccps-mg341-adsc1-111_firmwareRange3.7.10
AND
conteccps-mg341-adsc1-111Match-
Node
conteccps-mg341-adsc1-931_firmwareRange3.7.10
AND
conteccps-mg341-adsc1-931Match-
Node
conteccps-mg341g-adsc1-111_firmwareRange3.7.10
AND
conteccps-mg341g-adsc1-111Match-
Node
conteccps-mg341g-adsc1-930_firmwareRange3.7.10
AND
conteccps-mg341g-adsc1-930Match-
Node
conteccps-mg341g5-adsc1-931_firmwareRange3.7.10
AND
conteccps-mg341g5-adsc1-931Match-
Node
conteccps-mc341-adsc1-111_firmwareRange3.7.6
AND
conteccps-mc341-adsc1-111Match-
Node
conteccps-mc341-adsc1-931_firmwareRange3.7.6
AND
conteccps-mc341-adsc1-931Match-
Node
conteccps-mc341-adsc2-111_firmwareRange3.7.6
AND
conteccps-mc341-adsc2-111Match-
Node
conteccps-mc341g-adsc1-110_firmwareRange3.7.6
AND
conteccps-mc341g-adsc1-110Match-
Node
conteccps-mc341q-adsc1-111_firmwareRange3.7.6
AND
conteccps-mc341q-adsc1-111Match-
Node
conteccps-mc341-ds1-111_firmwareRange3.7.6
AND
conteccps-mc341-ds1-111Match-
Node
conteccps-mc341-ds11-111_firmwareRange3.7.6
AND
conteccps-mc341-ds11-111Match-
Node
conteccps-mc341-ds2-911_firmwareRange3.7.6
AND
conteccps-mc341-ds2-911Match-
Node
conteccps-mc341-a1-111_firmwareRange3.7.6
AND
conteccps-mc341-a1-111Match-
Node
conteccps-mcs341-ds1-111_firmwareRange3.8.8
AND
conteccps-mcs341-ds1-111Match-
Node
conteccps-mcs341-ds1-131_firmwareRange3.8.8
AND
conteccps-mcs341-ds1-131Match-
Node
conteccps-mcs341g-ds1-130_firmwareRange3.8.8
AND
conteccps-mcs341g-ds1-130Match-
Node
conteccps-mcs341g5-ds1-130_firmwareRange3.8.8
AND
conteccps-mcs341g5-ds1-130Match-
Node
conteccps-mcs341q-ds1-131_firmwareRange3.8.8
AND
conteccps-mcs341q-ds1-131Match-

CNA Affected

[
  {
    "vendor": "Contec CO.,LTD.",
    "product": "CONPROSYS IoT Gateway products",
    "versions": [
      {
        "version": "M2M Gateway with the firmware Ver.3.7.10 and earlier (CPS-MG341-ADSC1-111, CPS-MG341-ADSC1-931, CPS-MG341G-ADSC1-111, CPS-MG341G-ADSC1-930, and CPS-MG341G5-ADSC1-931), M2M Controller Integrated Type with firmware Ver.3.7.6 and earlier versions (CPS-MC341-ADSC1-111, CPS-MC341-ADSC1-931, CPS-MC341-ADSC2-111, CPS-MC341G-ADSC1-110, CPS-MC341Q-ADSC1-111, CPS-MC341-DS1-111, CPS-MC341-DS11-111, CPS-MC341-DS2-911, and CPS-MC341-A1-111), and M2M Controller Configurable Type with firmware Ver.3.8.8 and earlier versions (CPS-MCS341-DS1-111, CPS-MCS341-DS1-131, CPS-MCS341G-DS1-130, CPS-MCS341G5-DS1-130, and CPS-MCS341Q-DS1-131)",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.5%

Related for CVE-2023-27917