Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to improper input validation of user input to the service_start, service_stop, and service_restart modules of the software. This could allow an attacker to start, stop, or restart arbitrary services running on the server.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-46456 Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to improper input validation of user input to the service_start, service_stop, and service_restart modules of the software. This could allow an attacker to start, stop, or restart arbitrary services running on the server.
Fixes

Solution

Sewio has provided the following updates and recommends that users update to the latest version: * RTLS Studio: Update to version 3.0.0 or later https://portal.sewio.net/login  (requires login)


Workaround

Sewio also recommends the following workarounds to reduce the risk of exploitation: * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01 . * Locate control system networks and remote devices behind firewalls and isolate them from business networks.

History

Thu, 16 Jan 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T22:00:25.829Z

Reserved: 2022-12-21T18:52:32.305Z

Link: CVE-2022-43455

cve-icon Vulnrichment

Updated: 2024-08-03T13:32:59.123Z

cve-icon NVD

Status : Modified

Published: 2023-01-18T01:15:12.360

Modified: 2024-11-21T07:26:31.147

Link: CVE-2022-43455

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.