Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2023-05-22T19:37:10.365Z
Updated: 2023-05-22T19:37:10.365Z
Reserved: 2023-04-26T19:18:23.299Z
Link: CVE-2023-31245
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-05-22T20:15:10.807
Modified: 2023-05-31T15:23:25.923
Link: CVE-2023-31245
JSON object: View
Redhat Information
No data.
CWE