Risk | High |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2023-35124 CVE-2023-32615 CVE-2023-34317 CVE-2023-32271 CVE-2023-34353 CVE-2023-31242 CVE-2023-34998 CVE-2023-34994 |
CWE-ID | CWE-209 CWE-73 CWE-20 CWE-200 CWE-330 CWE-284 CWE-319 CWE-770 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
OAS Platform Client/Desktop applications / Other client software |
Vendor | Open Automation Software |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU80488
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-35124
CWE-ID:
CWE-209 - Information Exposure Through an Error Message
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the OAS Engine configuration management functionality. A remote user can send a specially crafted request and gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOAS Platform: 18.00.0072
CPE2.3 External linkshttp://talosintelligence.com/vulnerability_reports/TALOS-2023-1775
http://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1775
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80500
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32615
CWE-ID:
CWE-73 - External Control of File Name or Path
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to create arbitrary files.
The vulnerability exists due to application allows an attacker to control path of the files to delete within the OAS Engine configuration functionality. A remote user can send a specially crafted HTTP request and create or overwrite arbitrary files on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOAS Platform: 18.00.0072
CPE2.3 External linkshttp://talosintelligence.com/vulnerability_reports/TALOS-2023-1771
http://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1771
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80496
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-34317
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in the OAS Engine User Creation functionality. A remote user can pass specially crafted input to the application and cause unexpected data in the configuration.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOAS Platform: 18.00.0072
CPE2.3 External linkshttp://talosintelligence.com/vulnerability_reports/TALOS-2023-1772
http://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1772
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80495
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32271
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the OAS Engine configuration management functionality. A remote user can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOAS Platform: 18.00.0072
CPE2.3 External linkshttp://talosintelligence.com/vulnerability_reports/TALOS-2023-1774
http://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1774
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80493
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-34353
CWE-ID:
CWE-330 - Use of Insufficiently Random Values
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to use of insufficiently random values in the OAS Engine authentication functionality. A remote attacker can decrypt sensitive information.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOAS Platform: 18.00.0072
CPE2.3 External linkshttp://talosintelligence.com/vulnerability_reports/TALOS-2023-1776
http://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1776
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80491
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-31242
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the OAS Engine functionality. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOAS Platform: 18.00.0072
CPE2.3 External linkshttp://talosintelligence.com/vulnerability_reports/TALOS-2023-1769
http://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1769
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80490
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-34998
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication.
The vulnerability exists due to software uses insecure communication channel to transmit sensitive information in the OAS Engine functionality. A remote attacker can bypass authentication on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOAS Platform: 18.00.0072
CPE2.3 External linkshttp://talosintelligence.com/vulnerability_reports/TALOS-2023-1770
http://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1770
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80489
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-34994
CWE-ID:
CWE-770 - Allocation of Resources Without Limits or Throttling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper resource allocation issue in the OAS Engine configuration management functionality. A remote user can pass specially crafted input to the application and create an arbitrary directory.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOAS Platform: 18.00.0072
CPE2.3 External linkshttp://talosintelligence.com/vulnerability_reports/TALOS-2023-1773
http://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1773
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.