Vulnerability Description
In instances where the screen is visible and remote mouse connection is enabled, KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 can be exploited to achieve local code execution at the root level.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kramerav | Via Go2 Firmware | < 4.0.1.1326 |
| Kramerav | Via Go2 | - |
| Kramerav | Via Connect2 Firmware | < 4.0.1.1326 |
| Kramerav | Via Connect2 | - |
Related Weaknesses (CWE)
References
- http://kramerav.comProduct
- https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2023-33469ExploitThird Party Advisory
- http://kramerav.comProduct
- https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2023-33469ExploitThird Party Advisory
FAQ
What is CVE-2023-33469?
CVE-2023-33469 is a vulnerability with a CVSS score of 7.8 (HIGH). In instances where the screen is visible and remote mouse connection is enabled, KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 can be exploited to achieve local co...
How severe is CVE-2023-33469?
CVE-2023-33469 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33469?
Check the references section above for vendor advisories and patch information. Affected products include: Kramerav Via Go2 Firmware, Kramerav Via Go2, Kramerav Via Connect2 Firmware, Kramerav Via Connect2.