CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.0 | $0-$5k | 0.20 |
A vulnerability, which was classified as critical, has been found in Poly Trio 8300, Trio 8500, Trio 8800, Trio C60, CCX 350, CCX 400, CCX 500, CCX 505, CCX 600, CCX 700, EDGE E100, EDGE E220, EDGE E300, EDGE E320, EDGE E350, EDGE E400, EDGE E450, EDGE E500, EDGE E550, VVX 101, VVX 150, VVX 201, VVX 250, VVX 300, VVX 301, VVX 310, VVX 311, VVX 350, VVX 400, VVX 401, VVX 410, VVX 411, VVX 450, VVX 500, VVX 501, VVX 600 and VVX 601. This issue affects an unknown functionality of the component Diagnostic Telnet Mode. The manipulation with an unknown input leads to a os command injection vulnerability. Using CWE to declare the problem leads to CWE-78. The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. Impacted is confidentiality, integrity, and availability.
The weakness was disclosed 12/29/2023 by Christoph Wolff and Pascal Zenker with modzero AG as MZ-23-01. The advisory is shared at modzero.com. The identification of this vulnerability is CVE-2023-4464. Technical details are unknown but a public exploit is available. MITRE ATT&CK project uses the attack technique T1202 for this issue. The advisory points out:
Poly devices include a diagnostic Telnet mode, which allows an administrator to execute a restricted set of commands, once the mode has been enabled via configuration. Some of these commands are not properly validated and allow for OS command injection as the root user.
The exploit is available at github.com. It is declared as proof-of-concept.
Upgrading eliminates this vulnerability.
fahrplan.events.ccc.de is providing further details. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Vendor
Name
- CCX 350
- CCX 400
- CCX 500
- CCX 505
- CCX 600
- CCX 700
- EDGE E100
- EDGE E220
- EDGE E300
- EDGE E320
- EDGE E350
- EDGE E400
- EDGE E450
- EDGE E500
- EDGE E550
- Trio 8300
- Trio 8500
- Trio 8800
- Trio C60
- VVX 101
- VVX 150
- VVX 201
- VVX 250
- VVX 300
- VVX 301
- VVX 310
- VVX 311
- VVX 350
- VVX 400
- VVX 401
- VVX 410
- VVX 411
- VVX 450
- VVX 500
- VVX 501
- VVX 600
- VVX 601
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.2VulDB Meta Temp Score: 7.0
VulDB Base Score: 7.2
VulDB Temp Score: 6.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
Researcher Base Score: 7.2
Researcher Vector: 🔍
CNA Base Score: 7.2
CNA Vector (VulDB): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Os command injectionCWE: CWE-78 / CWE-77 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
08/21/2023 🔍12/29/2023 🔍
12/29/2023 🔍
01/21/2024 🔍
Sources
Advisory: MZ-23-01Researcher: Christoph Wolff, Pascal Zenker
Organization: modzero AG
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2023-4464 (🔍)
Misc.: 🔍
Entry
Created: 12/29/2023 10:28 AMUpdated: 01/21/2024 07:32 AM
Changes: 12/29/2023 10:28 AM (40), 12/29/2023 10:32 AM (14), 12/29/2023 10:39 AM (1), 01/09/2024 05:12 PM (2), 01/09/2024 05:17 PM (3), 01/21/2024 07:26 AM (2), 01/21/2024 07:32 AM (18)
Complete: 🔍
Cache ID: 18:933:40
No comments yet. Languages: en.
Please log in to comment.