First published: Wed Jul 05 2023(Updated: )
The websocket configuration endpoint of the Loxone Miniserver Go Gen.2 before 14.1.5.9 allows remote authenticated administrators to inject arbitrary OS commands via the timezone parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Loxone Miniserver Go Gen 2 | <14.1.5.9 | |
Loxone Miniserver Go Gen 2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36622 is considered a high severity vulnerability due to its potential for remote OS command injection.
To fix CVE-2023-36622, upgrade the Loxone Miniserver Go Gen.2 to version 14.1.5.9 or later.
CVE-2023-36622 affects remote authenticated administrators using Loxone Miniserver Go Gen.2 firmware versions earlier than 14.1.5.9.
The attack vector for CVE-2023-36622 involves exploiting the websocket configuration endpoint to inject arbitrary OS commands.
The impact of CVE-2023-36622 allows attackers to execute arbitrary commands on the underlying operating system, potentially leading to total system compromise.