An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 08:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://milesight.com - Product | |
References | () http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html - | |
References | () http://ur5x.com - Broken Link, Not Applicable | |
References | () https://github.com/win3zz/CVE-2023-43261 - Exploit, Third Party Advisory | |
References | () https://medium.com/%40win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf - | |
References | () https://support.milesight-iot.com/support/home - Product |
05 Feb 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-04 12:15
Updated : 2024-11-21 08:23
NVD link : CVE-2023-43261
Mitre link : CVE-2023-43261
CVE.ORG link : CVE-2023-43261
JSON object : View
Products Affected
milesight
- ur35_firmware
- ur41_firmware
- ur32_firmware
- ur32l_firmware
- ur5x_firmware
- ur55
- ur35
- ur32l
- ur41
- ur51
- ur32
- ur52
CWE
CWE-532
Insertion of Sensitive Information into Log File