An attacker with access to the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "username" parameter in the SNMP configuration.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-47197 | An attacker with access to the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "username" parameter in the SNMP configuration. |
Fixes
Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities. The reported cross-site scripting will be mitigated in a future report.
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T19:30:24.199Z
Reserved: 2023-10-12T20:21:27.751Z
Link: CVE-2023-42765
Updated: 2024-08-02T19:30:24.199Z
Status : Modified
Published: 2024-02-06T22:16:13.523
Modified: 2024-11-21T08:23:07.023
Link: CVE-2023-42765
No data.
OpenCVE Enrichment
No data.
EUVD