A potential attacker with or without (cookie theft) access to the device would be able to include malicious code (XSS) when uploading new device configuration that could affect the intended function of the device.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-42075 | A potential attacker with or without (cookie theft) access to the device would be able to include malicious code (XSS) when uploading new device configuration that could affect the intended function of the device. |
Fixes
Solution
Socomec reports that MODULYS GP (MOD3GP-SY-120K) is an End-of-Life product. Socomec recommends using MODULYS GP2 (M4-S-XXX) instead. MODULYS GP2 (M4-S-XXX) is not affected by the above vulnerabilities.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T17:39:12.120Z
Reserved: 2023-09-06T15:41:16.539Z
Link: CVE-2023-38255

Updated: 2024-08-02T17:39:12.120Z

Status : Modified
Published: 2023-09-18T21:15:53.000
Modified: 2024-11-21T08:13:11.683
Link: CVE-2023-38255

No data.

No data.