Vulnerability Details : CVE-2023-38378
The web interface on the RIGOL MSO5000 digital oscilloscope with firmware 00.01.03.00.03 allows remote attackers to execute arbitrary code via shell metacharacters in pass1 to the webcontrol changepwd.cgi application.
Vulnerability category: Execute code
Products affected by CVE-2023-38378
- cpe:2.3:o:rigol:mso5000_firmware:00.01.03.00.03:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-38378
0.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-38378
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-38378
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-38378
-
https://tortel.li/post/insecure-scope/
Unauthenticated RCE on a RIGOL oscilloscope - tortel.liExploit;Third Party Advisory
-
https://news.ycombinator.com/item?id=36745664
Unauthenticated RCE on a RIGOL oscilloscope | Hacker NewsIssue Tracking;Third Party Advisory
Jump to