Vulnerability Details : CVE-2023-31634
In TeslaMate before 1.27.2, there is unauthorized access to port 4000 for remote viewing and operation of user data. After accessing the IP address for the TeslaMate instance, an attacker can switch the port to 3000 to enter Grafana for remote operations. At that time, the default username and password can be used to enter the Grafana management console without logging in, a related issue to CVE-2022-23126.
Vulnerability category: Bypass
Products affected by CVE-2023-31634
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-31634
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-31634
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-08-02 |
CWE ids for CVE-2023-31634
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-31634
-
https://github.com/XC9409/CVE-2023-31634/blob/main/PoC
CVE-2023-31634/PoC at main · XC9409/CVE-2023-31634 · GitHub
-
https://github.com/adriankumpf/teslamate/releases/tag/v1.27.2
Release v1.27.2 · teslamate-org/teslamate · GitHub
Jump to