First published: Wed Oct 18 2023(Updated: )
Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
=2.4.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5642 is critical, with a CVSS score of 9.8.
No, CVE-2023-5642 allows an unauthenticated remote attacker to exploit it.
An attacker who successfully exploits CVE-2023-5642 can read from and write to the snmpmon.ini file, which contains sensitive information.
To fix CVE-2023-5642, it is recommended to update to a version of Advantech R-SeeNet that is not affected by the vulnerability.
More information about CVE-2023-5642 can be found at the following link: https://tenable.com/security/research/tra-2023-33