First published: Tue Dec 05 2023(Updated: )
An argument injection vulnerability has been identified in the administrative web interface of the Atos Unify OpenScape products "Session Border Controller" (SBC) and "Branch", before version V10 R3.4.0, and OpenScape "BCF" before versions V10R10.12.00 and V10R11.05.02. This allows an unauthenticated attacker to gain root access to the appliance via SSH (scope change) and also bypass authentication for the administrative interface and gain access as an arbitrary (administrative) user.
Credit: 551230f0-3615-47bd-b7cc-93e92e730bbf
Affected Software | Affected Version | How to fix |
---|---|---|
Atos Unify OpenScape BCF | >=10<10r10.12.00 | |
Atos Unify OpenScape Branch | >=10<10r3.4.0 | |
Atos Unify Openscape Session Border Controller | >=10<10r3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6269 is classified as a high severity vulnerability due to the potential for argument injection in the affected products.
To fix CVE-2023-6269, upgrade to Atos Unify OpenScape products versions V10 R3.4.0 or later for SBC and Branch, and V10R10.12.00 or V10R11.05.02 for BCF.
CVE-2023-6269 affects Atos Unify OpenScape Session Border Controller, Branch, and BCF versions prior to the specified updates.
CVE-2023-6269 is an argument injection vulnerability that can lead to unauthorized access and manipulation of the system.
Yes, CVE-2023-6269 can be exploited remotely through the administrative web interface of the affected products.