Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior use a proprietary local area network (LAN) protocol that does not verify updates to the device. An attacker could upload a malformed update file to the device and execute arbitrary code.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26478 | Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior use a proprietary local area network (LAN) protocol that does not verify updates to the device. An attacker could upload a malformed update file to the device and execute arbitrary code. |
Fixes
Solution
Snap One has released the following updates for the affected products: * Version WB10.B929 https://app.ovrc.com/#/user-settings (login required)
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-03 |
|
History
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:58:40.447Z
Reserved: 2023-01-23T23:57:52.025Z
Link: CVE-2023-22315
Updated: 2024-08-02T10:07:05.902Z
Status : Modified
Published: 2023-01-30T22:15:12.517
Modified: 2024-11-21T07:44:30.813
Link: CVE-2023-22315
No data.
OpenCVE Enrichment
No data.
EUVD