cve/2023/CVE-2023-6929.md

18 lines
906 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-6929](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6929)
![](https://img.shields.io/static/v1?label=Product&message=ETL3100&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v01c01%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen)
### Description
EuroTel ETL3100 versions v01c01 and v01x37 are vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers can bypass authorization, access the hidden resources on the system, and execute privileged functionalities.
### POC
#### Reference
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
#### Github
No PoCs found on GitHub currently.