First published: Mon May 22 2023(Updated: )
Teltonika’s Remote Management System versions prior to 4.10.0 contain a virtual private network (VPN) hub feature for cross-device communication that uses OpenVPN. It connects new devices in a manner that allows the new device to communicate with all Teltonika devices connected to the VPN. The OpenVPN server also allows users to route through it. An attacker could route a connection to a remote server through the OpenVPN server, enabling them to scan and access data from other Teltonika devices connected to the VPN.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Teltonika Remote Management System | <4.10.0 | |
Teltonika Remote Management System (RMS): Versions prior to 4.10.0 (affected by CVE-2023-32346, CVE-2023-32347, CVE-2023-32348, CVE-2023-2587, CVE-2023-2588) | ||
Teltonika Remote Management System (RMS): Versions prior to 4.14.0 (affected by CVE-2023-2586) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03.4 (affected by CVE-2023-32349) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03 (affected by CVE-2023-32350) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32348 has been classified as a high severity vulnerability affecting Teltonika's Remote Management System.
To fix CVE-2023-32348, upgrade the Teltonika Remote Management System to version 4.10.0 or later.
CVE-2023-32348 affects all versions of Teltonika's Remote Management System prior to 4.10.0.
CVE-2023-32348 impacts the VPN hub feature used for cross-device communication, allowing unauthorized access to connected devices.
Yes, CVE-2023-32348 is related to several other vulnerabilities affecting Teltonika's Remote Management System, including CVE-2023-32346 and CVE-2023-32347.