Lucene search

K
cvelistASRGCVELIST:CVE-2023-6248
HistoryNov 21, 2023 - 9:49 p.m.

CVE-2023-6248 Data leakage and arbitrary remote code execution in Syrus cloud devices

2023-11-2121:49:35
CWE-319
CWE-94
CWE-287
CWE-200
ASRG
www.cve.org
2
data leakage
remote code execution
syrus4
mqtt server
unauthenticated attacker
location data
can bus messages
safe-immobilizer module
video camera
audio messages

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.002

Percentile

55.2%

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations:

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "Cloud Management System",
      "Telematics Gateway"
    ],
    "platforms": [
      "ARM",
      "Linux"
    ],
    "product": "Syrus4 IoT Telematics Gateway",
    "vendor": "Digital Communications Technologies",
    "versions": [
      {
        "status": "affected",
        "version": "apex-23.43.2"
      }
    ]
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.002

Percentile

55.2%

Related for CVELIST:CVE-2023-6248