Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 | Third Party Advisory US Government Resource |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.0 |
01 Jun 2023, 17:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:teltonika-networks:rutxr1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut956:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rutx09:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rutx08:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut300:-:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rutx10_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut901:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rutxr1:-:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut901_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut951:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rutx10:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rutx14:-:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut955_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut360:-:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rutx09_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut955:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rutx50:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut241:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut240:-:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rutx11_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rutx12_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut240_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rutx50_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rutx11:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut200:-:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut950_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut360_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut951_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rutx14_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut241_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rutx08_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut956_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:teltonika-networks:rut300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rutx12:-:*:*:*:*:*:*:* cpe:2.3:h:teltonika-networks:rut950:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 - Third Party Advisory, US Government Resource |
01 Jun 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution. |
22 May 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-22 16:15
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32349
Mitre link : CVE-2023-32349
CVE.ORG link : CVE-2023-32349
JSON object : View
Products Affected
teltonika-networks
- rut901
- rut300
- rutx10
- rutx14_firmware
- rutx10_firmware
- rutx08
- rutx12_firmware
- rutx50
- rutx14
- rutx50_firmware
- rutx11_firmware
- rutx09
- rut240_firmware
- rutx12
- rutx09_firmware
- rutx11
- rut200_firmware
- rut901_firmware
- rut360
- rut956_firmware
- rut955
- rut951
- rutxr1_firmware
- rut241_firmware
- rutxr1
- rut956
- rut240
- rutx08_firmware
- rut955_firmware
- rut200
- rut241
- rut951_firmware
- rut300_firmware
- rut360_firmware
- rut950
- rut950_firmware
CWE
CWE-15
External Control of System or Configuration Setting