First published: Mon May 22 2023(Updated: )
Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Teltonika Remote Management System (RMS): Versions prior to 4.10.0 (affected by CVE-2023-32346, CVE-2023-32347, CVE-2023-32348, CVE-2023-2587, CVE-2023-2588) | ||
Teltonika Remote Management System (RMS): Versions prior to 4.14.0 (affected by CVE-2023-2586) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03.4 (affected by CVE-2023-32349) | ||
Teltonika RUT model routers: Version 00.07.00 through 00.07.03 (affected by CVE-2023-32350) | ||
Teltonika Networks RUT200 Firmware | <=00.07.03.4 | |
Teltonika Networks RUT200 | ||
Teltonika Networks RUT240 Firmware | <=00.07.03.4 | |
Teltonika Networks RUT240 | ||
Teltonika RUT241 Firmware | <=00.07.03.4 | |
Teltonika Networks RUT241 | ||
teltonika-networks rut300 firmware | <=00.07.03.4 | |
teltonika-networks rut300 firmware | ||
Teltonika Networks RUT360 | <=00.07.03.4 | |
Teltonika Networks RUT360 | ||
Teltonika Networks RUT901 Firmware | <=00.07.03.4 | |
Teltonika Networks RUT901 Firmware | ||
Teltonika Networks RUT950 | <=00.07.03.4 | |
Teltonika Networks RUT950 | ||
Teltonika Networks RUT951 | <=00.07.03.4 | |
Teltonika Networks RUT951 | ||
teltonika-networks rut955 firmware | <=00.07.03.4 | |
teltonika-networks rut955 firmware | ||
teltonika-networks rut956 firmware | <=00.07.03.4 | |
teltonika-networks rut956 firmware | ||
Teltonika Networks RUTX08 Firmware | <=00.07.03.4 | |
Teltonika Networks RUTX08 Firmware | ||
teltonika-networks rutx09 | <=00.07.03.4 | |
Teltonika Networks RUTX09 Firmware | ||
Teltonika Networks RUTX10 | <=00.07.03.4 | |
Teltonika Networks RUTX10 | ||
Teltonika Networks RUTX11 | <=00.07.03.4 | |
Teltonika Networks RUTX11 | ||
teltonika-networks rutx12 firmware | <=00.07.03.4 | |
Teltonika Networks RUTX12 | ||
teltonika-networks rutx14 | >=00.07.00<=00.07.03.4 | |
Teltonika Networks RUTX14 | ||
teltonika-networks rutx50 firmware | >=00.07.00<=00.07.03.4 | |
Teltonika Networks RUTX50 | ||
Teltonika Networks RUTXR1 Firmware | >=00.07.00<=00.07.03.4 | |
Teltonika Networks RUTXR1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32349 is a vulnerability in Teltonika’s RUT router firmware versions 00.07.03.4 and prior that allows an authenticated attacker to use an exposed UCI configuration file to execute arbitrary commands and potentially gain unauthorized access to the system.
The severity of CVE-2023-32349 is high, with a CVSS score of 8.8.
An authenticated attacker can exploit CVE-2023-32349 by using the exposed UCI configuration file to execute arbitrary commands and gain unauthorized access to the system.
Teltonika’s RUT router firmware versions 00.07.03.4 and prior are affected by CVE-2023-32349.
No, Teltonika-networks Rut200 is not vulnerable to CVE-2023-32349.