The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication
of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network.
References
Link | Resource |
---|---|
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | Mitigation Vendor Advisory |
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 08:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-25 18:17
Updated : 2024-11-21 08:20
NVD link : CVE-2023-41255
Mitre link : CVE-2023-41255
CVE.ORG link : CVE-2023-41255
JSON object : View
Products Affected
boschrexroth
- ctrlx_hmi_web_panel_wr2110
- ctrlx_hmi_web_panel_wr2107
- ctrlx_hmi_web_panel_wr2110_firmware
- ctrlx_hmi_web_panel_wr2115_firmware
- ctrlx_hmi_web_panel_wr2115
- ctrlx_hmi_web_panel_wr2107_firmware
CWE
CWE-306
Missing Authentication for Critical Function