OS Command Injection Vulnerability in Milesight UR32L by Milesight
CVE-2023-22659

7.2HIGH

Key Information:

Vendor

Milesight

Status
Vendor
CVE Published:
6 July 2023

What is CVE-2023-22659?

An OS command injection vulnerability has been identified in the change_hostname functionality of the libzebra.so library within Milesight UR32L v32.3.0.5. This vulnerability allows attackers to exploit specially-crafted network packets to execute arbitrary commands on the device. By sending a specific sequence of requests, an intruder could potentially compromise the system, making it crucial for users to assess their exposure and apply necessary mitigations.

Affected Version(s)

UR32L v32.3.0.5

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Francesco Benvenuto of Cisco Talos.
.