Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.
Metrics
Affected Vendors & Products
References
History
Thu, 16 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:34:31.046Z
Reserved: 2023-05-08T22:09:43.872Z
Link: CVE-2023-2588

Updated: 2024-08-02T06:26:09.842Z

Status : Modified
Published: 2023-05-22T16:15:09.760
Modified: 2024-11-21T07:58:53.143
Link: CVE-2023-2588

No data.