First published: Mon May 22 2023(Updated: )
Teltonika’s Remote Management System versions prior to 4.10.0 contain a cross-site scripting (XSS) vulnerability in the main page of the web interface. An attacker with the MAC address and serial number of a connected device could send a maliciously crafted JSON file with an HTML object to trigger the vulnerability. This could allow the attacker to execute scripts in the account context and obtain remote code execution on managed devices.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Teltonika Remote Management System | <4.10.0 | |
Teltonika Remote Management System (RMS): Versions prior to 4.10.0 (affected by CVE-2023-32346, CVE-2023-32347, CVE-2023-32348, CVE-2023-2587, CVE-2023-2588) | ||
Teltonika Remote Management System (RMS): Versions prior to 4.14.0 (affected by CVE-2023-2586) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03.4 (affected by CVE-2023-32349) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03 (affected by CVE-2023-32350) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2587 is classified as a cross-site scripting (XSS) vulnerability, which poses a significant risk to users of the affected systems.
To fix CVE-2023-2587, upgrade your Teltonika Remote Management System to version 4.10.0 or later.
CVE-2023-2587 affects all versions of Teltonika’s Remote Management System prior to 4.10.0.
Yes, CVE-2023-2587 can be exploited remotely by an attacker who has knowledge of the MAC address and serial number of a connected device.
CVE-2023-2587 can facilitate cross-site scripting attacks, allowing attackers to execute malicious scripts in the context of the user's browser.