The affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with “user” privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 Mitigation Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2023-07-03T20:03:07.721Z

Updated: 2023-07-03T20:03:07.721Z

Reserved: 2023-06-23T20:39:08.361Z


Link: CVE-2023-36611

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-07-03T21:15:10.037

Modified: 2023-07-07T21:40:07.380


Link: CVE-2023-36611

JSON object: View

cve-icon Redhat Information

No data.

CWE