First published: Mon May 22 2023(Updated: )
Teltonika’s Remote Management System versions prior to 4.10.0 use device serial numbers and MAC addresses to identify devices from the user perspective for device claiming and from the device perspective for authentication. If an attacker obtained the serial number and MAC address of a device, they could authenticate as that device and steal communication credentials of the device. This could allow an attacker to enable arbitrary command execution as root by utilizing management options within the newly registered devices.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Teltonika Remote Management System | <4.10.0 | |
Teltonika Remote Management System (RMS): Versions prior to 4.10.0 (affected by CVE-2023-32346, CVE-2023-32347, CVE-2023-32348, CVE-2023-2587, CVE-2023-2588) | ||
Teltonika Remote Management System (RMS): Versions prior to 4.14.0 (affected by CVE-2023-2586) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03.4 (affected by CVE-2023-32349) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03 (affected by CVE-2023-32350) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32347 is classified as a high severity vulnerability due to its potential for device impersonation and unauthorized access.
To fix CVE-2023-32347, update the Teltonika Remote Management System to version 4.10.0 or later.
CVE-2023-32347 affects Teltonika Remote Management System versions prior to 4.10.0.
An attacker could exploit CVE-2023-32347 by obtaining device serial numbers and MAC addresses, leading to unauthorized device claiming and access.
Yes, CVE-2023-32347 is related to multiple vulnerabilities affecting Teltonika devices, including CVE-2023-32346 and CVE-2023-32348.