Lucene search

K
nvd[email protected]NVD:CVE-2023-6248
HistoryNov 21, 2023 - 10:15 p.m.

CVE-2023-6248

2023-11-2122:15:08
CWE-200
CWE-287
CWE-319
CWE-94
web.nvd.nist.gov
syrus4
iot gateway
mqtt server
remote code execution
data leakage
unsecured
remote attacker
location data
can bus messages
vehicle immobilization
live video
audio messages

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

55.2%

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations:

Affected configurations

NVD
Node
digitalcomtechsyrus_4g_iot_telematics_gateway_firmwareMatchapex-23.43.2
AND
digitalcomtechsyrus_4g_iot_telematics_gatewayMatch-

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

55.2%

Related for NVD:CVE-2023-6248