Vulnerability Details : CVE-2023-25183
In Snap One OvrC Pro versions prior to 7.2, when logged into the superuser account, a new functionality appears that could allow users to execute arbitrary commands on the hub device.
Products affected by CVE-2023-25183
- cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-25183
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-25183
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.3
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L |
3.9
|
3.7
|
ICS-CERT | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2023-25183
-
The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators.Assigned by: ics-cert@hq.dhs.gov (Secondary)
References for CVE-2023-25183
-
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01
Snap One OvrC Cloud | CISAThird Party Advisory;US Government Resource
-
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf
Release Notes
Jump to