2023-12-08 03:00:27 +00:00
{
"id" : "CVE-2023-43744" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-12-08T01:15:07.337" ,
2023-12-13 17:08:24 +00:00
"lastModified" : "2023-12-13T15:35:02.467" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-08 03:00:27 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An OS command injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an administrator to execute arbitrary OS commands via a file name parameter in a patch application function. The Zultys MX Administrator client has a \"Patch Manager\" section that allows administrators to apply patches to the device. The user supplied filename for the patch file is passed to a shell script without validation. Including bash command substitution characters in a patch file name results in execution of the provided command."
2023-12-13 17:08:24 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250 y MX30 con versiones de firmware anteriores al parche 17.0.10 17161 y al parche 16.04 16109 permite a un administrador ejecutar comandos arbitrarios del sistema operativo. a trav\u00e9s de un par\u00e1metro de nombre de archivo en una funci\u00f3n de aplicaci\u00f3n de parche. El cliente Zultys MX Administrator tiene una secci\u00f3n \"Administrador de parches\" que permite a los administradores aplicar parches al dispositivo. El nombre de archivo proporcionado por el usuario para el archivo de parche se pasa a un script de shell sin validaci\u00f3n. Incluir caracteres de sustituci\u00f3n de comandos bash en el nombre de un archivo de parche da como resultado la ejecuci\u00f3n del comando proporcionado."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "09D39AC9-ACBA-4CF9-B9F0-D04F6B392905"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "4D290A1E-9CF3-42C3-B099-9A0D5FFE2FDC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx-se:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8E4DCA4-D3CB-46DC-B20F-205F18FE6FA4"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "E2CE4D4C-0CB5-4AB9-936B-E275E4A6E1A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "9B040E08-BAF8-475B-BF5C-DC3D6D5FBBB1"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx-se_ii:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6DD550DD-C5C0-4ABC-9C29-016FC0587E97"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "3907F8B7-CB24-4BE4-8B8D-18F3D965EE7C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "2257C4EE-4C6F-4EC2-A88D-6048FFE28EC2"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx-e:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E12E140-C7D8-4875-9AF7-4EF1A77D9CF1"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "BCCC65F2-DAC8-4A47-A712-95D7E2579A3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "7657BBD9-09D8-4EEA-AC0B-5098C4369874"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx-virtual:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B765CFE-8D05-430C-9725-6FBC8C9D1484"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "9D49E46A-4BA6-4563-9786-D2BC5E05F1CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "B9572474-24A5-47C5-9A95-E8F4E0AB56C8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx250:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44FBBEC0-96AF-42D1-B27C-91E6F3E67F7D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx30_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0.4" ,
"matchCriteriaId" : "AF02FDBD-C0B9-4E6D-AEDD-3BB28D9EF059"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zultys:mx30_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.6" ,
"versionEndExcluding" : "17.0.10" ,
"matchCriteriaId" : "6EC94AF4-0D2B-4045-98DF-53E2014C139D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:zultys:mx30:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "45765B6E-39CE-4CD2-A20C-7DB96FDDEBF0"
}
]
}
]
2023-12-08 03:00:27 +00:00
}
] ,
"references" : [
{
"url" : "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0002.md" ,
2023-12-13 17:08:24 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-12-08 03:00:27 +00:00
} ,
{
"url" : "https://mxvirtual.com" ,
2023-12-13 17:08:24 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Product"
]
2023-12-08 03:00:27 +00:00
}
]
}