First published: Mon Sep 18 2023(Updated: )
A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.
Credit: psirt@bosch.com psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch Rts Vlink Virtual Matrix | >=5.0.0<5.7.6 | |
Bosch Rts Vlink Virtual Matrix | >=6.0.0<6.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34999 is high with a CVSS score of 7.2.
The command injection vulnerability allows an attacker to execute arbitrary code via the admin web interface, which can lead to unauthorized access and control of the system.
If you are using RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) or v6 (< 6.5.0), your system may be affected by CVE-2023-34999.
Yes, Bosch has released patches to address the command injection vulnerability in RTS VLink Virtual Matrix Software. Please refer to the vendor's security advisory for more information.
You can find more information about CVE-2023-34999 in Bosch's security advisory at the following link: [https://psirt.bosch.com/security-advisories/BOSCH-SA-893251-BT.html](https://psirt.bosch.com/security-advisories/BOSCH-SA-893251-BT.html)