CVE-2023-43744
08.12.2023, 01:15
An OS command injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an administrator to execute arbitrary OS commands via a file name parameter in a patch application function. The Zultys MX Administrator client has a "Patch Manager" section that allows administrators to apply patches to the device. The user supplied filename for the patch file is passed to a shell script without validation. Including bash command substitution characters in a patch file name results in execution of the provided command.
Vendor | Product | Version |
---|---|---|
zultys | mx-se_firmware | 𝑥 < 16.0.4 |
zultys | mx-se_firmware | 17.0.6 ≤ 𝑥 < 17.0.10 |
zultys | mx-se_ii_firmware | 𝑥 < 16.0.4 |
zultys | mx-se_ii_firmware | 17.0.6 ≤ 𝑥 < 17.0.10 |
zultys | mx-e_firmware | 𝑥 < 16.0.4 |
zultys | mx-e_firmware | 17.0.6 ≤ 𝑥 < 17.0.10 |
zultys | mx-virtual_firmware | 𝑥 < 16.0.4 |
zultys | mx-virtual_firmware | 17.0.6 ≤ 𝑥 < 17.0.10 |
zultys | mx250_firmware | 𝑥 < 16.0.4 |
zultys | mx250_firmware | 17.0.6 ≤ 𝑥 < 17.0.10 |
zultys | mx30_firmware | 𝑥 < 16.0.4 |
zultys | mx30_firmware | 17.0.6 ≤ 𝑥 < 17.0.10 |
𝑥
= Vulnerable software versions