We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-40221

Socomec MOD3GP-SY-120K Code Injection



Assignericscert
Reserved2023-09-06
Published2023-09-18
Updated2024-08-02

Description

The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.



HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

v01.12.10
affected

Credits

Aarón Flecha Menéndez reported these vulnerabilities to CISA. finder

References

https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03

cve.org CVE-2023-40221

nvd.nist.gov CVE-2023-40221

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-40221
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.