First published: Thu Jul 06 2023(Updated: )
A misconfiguration vulnerability exists in the urvpn_client functionality of Milesight UR32L v32.3.0.5. A specially-crafted man-in-the-middle attack can lead to increased privileges. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight UR-32L | =32.3.0.5 | |
Milesight UR-32L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23546 has been rated with a high severity due to its potential for privilege escalation through a man-in-the-middle attack.
To mitigate CVE-2023-23546, ensure that you update the Milesight UR32L firmware to version 32.3.0.6 or later.
CVE-2023-23546 is associated with a man-in-the-middle attack that exploits a misconfiguration in the urvpn_client functionality.
The vulnerable version of Milesight UR32L is firmware version 32.3.0.5.
CVE-2023-23546 can lead to increased privileges for an attacker, potentially compromising the affected system.