First published: Tue Apr 09 2024(Updated: )
A command injection vulnerability exists in the com.webos.service.connectionmanager/tv/setVlanStaticAddress endpoint on webOS versions 5 and 6. A series of specially crafted requests can lead to command execution as the dbus user. An attacker can make authenticated requests to trigger this vulnerability. Full versions and TV models affected: * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB
Credit: cve-requests@bitdefender.com
Affected Software | Affected Version | How to fix |
---|---|---|
LG webOS | >=5.0.0<7.0.0 | |
All of | ||
LG webOS | =5.5.0 | |
LG OLED55CXPUA | ||
All of | ||
LG webOS | =6.3.3-442 | |
LG OLED48C1PUB |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6320 is considered a high-severity vulnerability due to its potential for command injection leading to unauthorized command execution.
To fix CVE-2023-6320, update your LG webOS device to version 7.0.0 or later.
CVE-2023-6320 affects LG webOS versions 5.0.0 through 6.x.
An attacker can exploit CVE-2023-6320 to execute arbitrary commands as the dbus user through specially crafted requests.
Yes, exploiting CVE-2023-6320 requires the attacker to make authenticated requests to the vulnerable endpoint.