Vulnerability Description
Atos Unify OpenScape Session Border Controller through V10 R3.01.03 allows execution of administrative scripts by unauthenticated users.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Unify | Session Border Controller | 10_r3.01.03 |
Related Weaknesses (CWE)
References
- https://networks.unify.com/security/advisories/OBSO-2307-01.pdfVendor Advisory
- https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-ExecutionExploitThird Party AdvisoryVDB Entry
- https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-exeExploitThird Party Advisory
- https://networks.unify.com/security/advisories/OBSO-2307-01.pdfVendor Advisory
- https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-ExecutionExploitThird Party AdvisoryVDB Entry
- https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-exeExploitThird Party Advisory
FAQ
What is CVE-2023-36619?
CVE-2023-36619 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Atos Unify OpenScape Session Border Controller through V10 R3.01.03 allows execution of administrative scripts by unauthenticated users.
How severe is CVE-2023-36619?
CVE-2023-36619 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-36619?
Check the references section above for vendor advisories and patch information. Affected products include: Unify Session Border Controller.