Lucene search

K
nvd[email protected]NVD:CVE-2023-43744
HistoryDec 08, 2023 - 1:15 a.m.

CVE-2023-43744

2023-12-0801:15:07
CWE-78
web.nvd.nist.gov
4
vulnerability
zultys
command injection
firmware
patch
administrator
patch manager
file name parameter
shell script

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

22.9%

An OS command injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an administrator to execute arbitrary OS commands via a file name parameter in a patch application function. The Zultys MX Administrator client has a “Patch Manager” section that allows administrators to apply patches to the device. The user supplied filename for the patch file is passed to a shell script without validation. Including bash command substitution characters in a patch file name results in execution of the provided command.

Affected configurations

Nvd
Node
zultysmx-se_firmwareRange<16.0.4
OR
zultysmx-se_firmwareRange17.0.617.0.10
AND
zultysmx-seMatch-
Node
zultysmx-se_ii_firmwareRange<16.0.4
OR
zultysmx-se_ii_firmwareRange17.0.617.0.10
AND
zultysmx-se_iiMatch-
Node
zultysmx-e_firmwareRange<16.0.4
OR
zultysmx-e_firmwareRange17.0.617.0.10
AND
zultysmx-eMatch-
Node
zultysmx-virtual_firmwareRange<16.0.4
OR
zultysmx-virtual_firmwareRange17.0.617.0.10
AND
zultysmx-virtualMatch-
Node
zultysmx250_firmwareRange<16.0.4
OR
zultysmx250_firmwareRange17.0.617.0.10
AND
zultysmx250Match-
Node
zultysmx30_firmwareRange<16.0.4
OR
zultysmx30_firmwareRange17.0.617.0.10
AND
zultysmx30Match-
VendorProductVersionCPE
zultysmx-se_firmware*cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:*
zultysmx-se-cpe:2.3:h:zultys:mx-se:-:*:*:*:*:*:*:*
zultysmx-se_ii_firmware*cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:*
zultysmx-se_ii-cpe:2.3:h:zultys:mx-se_ii:-:*:*:*:*:*:*:*
zultysmx-e_firmware*cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:*
zultysmx-e-cpe:2.3:h:zultys:mx-e:-:*:*:*:*:*:*:*
zultysmx-virtual_firmware*cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:*
zultysmx-virtual-cpe:2.3:h:zultys:mx-virtual:-:*:*:*:*:*:*:*
zultysmx250_firmware*cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:*
zultysmx250-cpe:2.3:h:zultys:mx250:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 121

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

22.9%

Related for NVD:CVE-2023-43744