First published: Wed Sep 27 2023(Updated: )
Real Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway's HTTP interface would redirect to the main page, which is index.htm.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Real Time Automation 460 Series | <8.9.8 | |
Real Time Automation 460 Series | ||
Real Time Automation 460 Series | ||
Real Time Automation 460 Series | ||
Real Time Automation 460 Series | ||
Real Time Automation 460 Series | ||
All of | ||
Real Time Automation 460 Series | <8.9.8 | |
Any of | ||
Real Time Automation 460 Series | ||
Real Time Automation 460 Series | ||
Real Time Automation 460 Series | ||
Real Time Automation 460 Series | ||
Real Time Automation 460 Series |
Real Time Automation recommends users download and apply the new version of their product. To update the software, contact Real Time Automation directly for assistance.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4523 is a vulnerability found in Real Time Automation 460 Series products with versions prior to v8.9.8, which allows for cross-site scripting attacks.
The severity of CVE-2023-4523 is critical with a severity value of 6.1.
CVE-2023-4523 affects Real Time Automation 460 Series products with versions prior to v8.9.8, allowing attackers to execute arbitrary JavaScript code via cross-site scripting.
To fix CVE-2023-4523, it is recommended to update Real Time Automation 460 Series products to version v8.9.8 or later.
More information about CVE-2023-4523 can be found at the following reference: [https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01](https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01)