First published: Tue May 02 2023(Updated: )
3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
3CX 3CX | <18.0.3.461 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this 3CX vulnerability is CVE-2022-48483.
The severity of CVE-2022-48483 is high, with a CVSS score of 7.5.
CVE-2022-48483 affects 3CX software before 18 Hotfix 1 build 18.0.3.461 on Windows.
An unauthenticated remote attacker can exploit CVE-2022-48483 to read %WINDIR%\system32 files via directory traversal in conjunction with a drive letter and backslash characters.
Yes, you can find references for CVE-2022-48483 at the following links: [Link 1](https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88), [Link 2](https://www.3cx.com/blog/change-log/phone-system-change-log/).