Vulnerability Details : CVE-2023-2588
Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.
Vulnerability category: Execute code
Products affected by CVE-2023-2588
- cpe:2.3:a:teltonika:remote_management_system:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-2588
0.63%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-2588
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
ICS-CERT | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-2588
-
The product includes web functionality (such as a web widget) from another domain, which causes it to operate within the domain of the product, potentially granting total access and control of the product to the untrusted source.Assigned by: ics-cert@hq.dhs.gov (Primary)
References for CVE-2023-2588
-
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08
Teltonika Remote Management System and RUT Model Routers | CISAThird Party Advisory;US Government Resource
Jump to