First published: Tue Apr 09 2024(Updated: )
A command injection vulnerability exists in the processAnalyticsReport method from the com.webos.service.cloudupload service on webOS version 5 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability. Full versions and TV models affected: * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
LG webOS | >=5.0.0<8.0.0 | |
All of | ||
LG webOS | =5.5.0 | |
LG OLED55CXPUA | ||
All of | ||
LG webOS | =6.3.3-442 | |
LG OLED48C1PUB | ||
All of | ||
LG webOS | =7.3.1-43 | |
LG OLED55A23LA |
An update to a newer firmware version fixes the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6318 is classified as a high-severity command injection vulnerability.
To fix CVE-2023-6318, users should update their LG webOS systems to version 8.0.0 or later.
CVE-2023-6318 affects LG webOS versions 5.0.0 to 7.3.1-43.
An attacker can execute commands as the root user through a series of specially crafted requests due to CVE-2023-6318.
Yes, exploiting CVE-2023-6318 requires an attacker to make authenticated requests.