The affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with “user” privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 | Mitigation Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2023-07-03T20:03:07.721Z
Updated: 2023-07-03T20:03:07.721Z
Reserved: 2023-06-23T20:39:08.361Z
Link: CVE-2023-36611
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-07-03T21:15:10.037
Modified: 2023-07-07T21:40:07.380
Link: CVE-2023-36611
JSON object: View
Redhat Information
No data.
CWE