Description
The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication
of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network.
Published: 2023-10-25
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-45772 The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network.
History

No history.

Subscriptions

Boschrexroth Ctrlx Hmi Web Panel Wr2107 Ctrlx Hmi Web Panel Wr2107 Firmware Ctrlx Hmi Web Panel Wr2110 Ctrlx Hmi Web Panel Wr2110 Firmware Ctrlx Hmi Web Panel Wr2115 Ctrlx Hmi Web Panel Wr2115 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published:

Updated: 2024-09-12T14:30:27.445Z

Reserved: 2023-10-18T09:35:22.497Z

Link: CVE-2023-41255

cve-icon Vulnrichment

Updated: 2024-08-02T18:54:04.641Z

cve-icon NVD

Status : Modified

Published: 2023-10-25T18:17:30.737

Modified: 2024-11-21T08:20:55.553

Link: CVE-2023-41255

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses