First published: Fri May 03 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MacMonitorConsole class. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of the current user.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Voltronic Power ViewPower |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51581 has a critical severity rating due to its potential for remote code execution without authentication.
To fix CVE-2023-51581, update your Voltronic Power ViewPower software to the latest version provided by the vendor.
The potential impacts of CVE-2023-51581 include unauthorized remote code execution, leading to complete system compromise.
All users of Voltronic Power ViewPower installations are affected by CVE-2023-51581.
No, authentication is not required to exploit CVE-2023-51581, making it particularly dangerous.