Description

















A potential attacker with or without (cookie theft) access to the device would be able to include malicious code (XSS) when uploading new device configuration that could affect the intended function of the device.

















Published: 2023-09-18
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Socomec reports that MODULYS GP (MOD3GP-SY-120K) is an End-of-Life product. Socomec recommends using MODULYS GP2 (M4-S-XXX) instead. MODULYS GP2 (M4-S-XXX) is not affected by the above vulnerabilities.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-42075 A potential attacker with or without (cookie theft) access to the device would be able to include malicious code (XSS) when uploading new device configuration that could affect the intended function of the device.
History

No history.

Subscriptions

Socomec Modulys Gp Modulys Gp Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-02T17:39:12.120Z

Reserved: 2023-09-06T15:41:16.539Z

Link: CVE-2023-38255

cve-icon Vulnrichment

Updated: 2024-08-02T17:39:12.120Z

cve-icon NVD

Status : Modified

Published: 2023-09-18T21:15:53.000

Modified: 2024-11-21T08:13:11.683

Link: CVE-2023-38255

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses