First published: Wed Jun 28 2023(Updated: )
A vulnerability exists that can be exploited by an authenticated client that is connected to the same network segment as the CoreTec 4, having any level of access VIEWER to ADMIN. To exploit the vulnerability the attacker can inject shell commands through a particular field of the web user interface that will be executed by the system.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Abb Txpert Hub Coretec 4 Firmware | <3.0.1 | |
Abb Txpert Hub Coretec 4 |
The vulnerability is remediated in TXpert Hub CoreTec 4 version 3.0.1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2625 is a vulnerability that can be exploited by an authenticated client connected to the same network segment as the CoreTec 4, allowing them to inject shell commands through a specific field of the web user interface.
The severity of CVE-2023-2625 is critical with a severity value of 8.
The Abb Txpert Hub Coretec 4 Firmware version up to 3.0.1 is affected by CVE-2023-2625.
To exploit CVE-2023-2625, an attacker needs to be an authenticated client connected to the same network segment as the CoreTec 4, with any level of access VIEWER to ADMIN, and inject shell commands through a particular field of the web user interface.
To fix the CVE-2023-2625 vulnerability, it is recommended to apply the latest version of the Abb Txpert Hub Coretec 4 Firmware that addresses the vulnerability.