First published: Mon May 22 2023(Updated: )
Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Teltonika Remote Management System | <4.10.0 | |
Teltonika Remote Management System (RMS): Versions prior to 4.10.0 (affected by CVE-2023-32346, CVE-2023-32347, CVE-2023-32348, CVE-2023-2587, CVE-2023-2588) | ||
Teltonika Remote Management System (RMS): Versions prior to 4.14.0 (affected by CVE-2023-2586) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03.4 (affected by CVE-2023-32349) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03 (affected by CVE-2023-32350) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2588 has been classified with a high severity due to the potential for unauthorized access to managed devices' SSH and web management services.
To fix CVE-2023-2588, upgrade the Teltonika Remote Management System to version 4.10.0 or later.
CVE-2023-2588 is associated with other vulnerabilities such as CVE-2023-32346, CVE-2023-32347, CVE-2023-32348, and CVE-2023-2587.
CVE-2023-2588 affects Teltonika Remote Management System versions prior to 4.10.0.
CVE-2023-2588 can be exploited remotely, allowing attackers to access secure shell and web administration interfaces.