Vulnerability Description
Atos Unify OpenScape Session Border Controller through V10 R3.01.03 allows execution of OS commands as root user by low-privileged authenticated users.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Unify | Session Border Controller | 10_r3.01.03 |
Related Weaknesses (CWE)
References
- https://networks.unify.com/security/advisories/OBSO-2307-01.pdfVendor Advisory
- https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-ExecutionExploitThird Party AdvisoryVDB Entry
- https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-exeExploitThird Party Advisory
- https://networks.unify.com/security/advisories/OBSO-2307-01.pdfVendor Advisory
- https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-ExecutionExploitThird Party AdvisoryVDB Entry
- https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-exeExploitThird Party Advisory
FAQ
What is CVE-2023-36618?
CVE-2023-36618 is a vulnerability with a CVSS score of 8.8 (HIGH). Atos Unify OpenScape Session Border Controller through V10 R3.01.03 allows execution of OS commands as root user by low-privileged authenticated users.
How severe is CVE-2023-36618?
CVE-2023-36618 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36618?
Check the references section above for vendor advisories and patch information. Affected products include: Unify Session Border Controller.