Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
| https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
| https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 08:01
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource | |
| References | () https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
31 May 2023, 15:23
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| CPE | cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:* cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:* cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:* |
|
| References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource | |
| References | (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes |
22 May 2023, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-05-22 20:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31245
Mitre link : CVE-2023-31245
CVE.ORG link : CVE-2023-31245
JSON object : View
Products Affected
control4
- ca-10
- ca-1
- ea-3
- ea-1
- ea-5
snapone
- pakedge_rk-1
- pakedge_rt-3100
- an-110-rt-2l1w-wifi
- an-310-rt-4l2w
- ovrc-300-pro
- pakedge_wr-1
- an-110-rt-2l1w
- orvc
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
