Network Access Violation in Milesight UR32L by Milesight
CVE-2023-23571

7.5HIGH

Key Information:

Vendor

Milesight

Status
Vendor
CVE Published:
6 July 2023

What is CVE-2023-23571?

An access violation vulnerability exists within the eventcore functionality of the Milesight UR32L (v32.3.0.5). This flaw allows an attacker to craft a malicious network request capable of disrupting service, thus leading to a denial of service. Exploitation of this vulnerability can cause significant service interruptions, highlighting the necessity for immediate assessment and mitigation measures.

Affected Version(s)

UR32L v32.3.0.5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Francesco Benvenuto of Cisco Talos.
.