First published: Wed Jul 05 2023(Updated: )
Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a password requirement.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Loxone Miniserver Go Gen 2 | <=14.0.3.28 | |
Loxone Miniserver Go Gen 2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36624 is considered a high-severity vulnerability due to the potential for privilege escalation.
To mitigate CVE-2023-36624, you should update the Loxone Miniserver Go Gen.2 firmware to a version later than 14.0.3.28.
CVE-2023-36624 is a privilege escalation vulnerability that affects the Sudo configuration.
CVE-2023-36624 affects users of Loxone Miniserver Go Gen.2 running firmware version 14.0.3.28 or lower.
CVE-2023-36624 requires an authenticated operating system user, which limits the scope of potential remote exploitation.