CVE-2023-43744

An OS command injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an administrator to execute arbitrary OS commands via a file name parameter in a patch application function. The Zultys MX Administrator client has a "Patch Manager" section that allows administrators to apply patches to the device. The user supplied filename for the patch file is passed to a shell script without validation. Including bash command substitution characters in a patch file name results in execution of the provided command.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx-se:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx-se_ii:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx-e:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx-virtual:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx250:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:zultys:mx30_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx30_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx30:-:*:*:*:*:*:*:*

History

13 Dec 2023, 15:35

Type Values Removed Values Added
CPE cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx250:-:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx-e:-:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx-se_ii:-:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx-se:-:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx30:-:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx30_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zultys:mx-virtual:-:*:*:*:*:*:*:*
CWE CWE-78
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
References () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0002.md - () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0002.md - Third Party Advisory
References () https://mxvirtual.com - () https://mxvirtual.com - Product

08 Dec 2023, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-08 01:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-43744

Mitre link : CVE-2023-43744

CVE.ORG link : CVE-2023-43744


JSON object : View

Products Affected

zultys

  • mx250
  • mx-se_ii_firmware
  • mx-e
  • mx-virtual
  • mx-se_ii
  • mx-se_firmware
  • mx250_firmware
  • mx-virtual_firmware
  • mx30_firmware
  • mx30
  • mx-se
  • mx-e_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')