First published: Wed Dec 13 2023(Updated: )
Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 devices are susceptible to Cross Site Request Forgery (CSRF) attacks due to the absence of CSRF protection in the web interface.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Relyum Rely-PCIe | =22.2.1 | |
Relyum Rely-PCIe | ||
All of | ||
Relyum Rely-rec | =23.1.0 | |
Relyum Rely-rec Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47578 has been classified as a medium severity vulnerability due to the potential for Cross Site Request Forgery (CSRF) attacks.
To mitigate CVE-2023-47578, you should implement CSRF protection in the web interface of Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 devices.
CVE-2023-47578 affects Relyum RELY-PCIe firmware version 22.2.1 and Relyum RELY-REC firmware version 23.1.0.
In the context of CVE-2023-47578, Cross Site Request Forgery allows an attacker to trick a user into sending unauthorized commands to a web application on which they are authenticated.
Currently, specific exploits for CVE-2023-47578 have not been publicly disclosed, but the vulnerability poses a risk if left unpatched.