First published: Thu Nov 09 2023(Updated: )
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion EHS5/6/8 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message.
Credit: vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Telit BGS5 | ||
Telit BGS5 | ||
All of | ||
Telit Ehs5 Firmware | ||
Telit Ehs5 Firmware | ||
All of | ||
Telit EHS6 Firmware | ||
Telit EHS6 Firmware | ||
All of | ||
Telit Ehs8 | ||
Telit Ehs8 Firmware | ||
All of | ||
Telit Pds5 Firmware | ||
Telit Pds5 Firmware | ||
All of | ||
Telit PDS6 | ||
Telit PDS6 | ||
All of | ||
Telit PDS8 | ||
Telit PDS8 | ||
All of | ||
Telit Els61 | ||
Telit Els61 Firmware | ||
All of | ||
Telit Els81 | ||
Telit Els81 Firmware | ||
All of | ||
Telit Pls62 | ||
Telit Pls62 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-47610.
The severity of CVE-2023-47610 is critical, with a severity value of 9.8.
Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, and Telit Cinterion PLS62 firmware are affected by CVE-2023-47610.
CVE-2023-47610 could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system.
More information about CVE-2023-47610 can be found at the following reference link: [https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/](https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/)