HIGH · 7.8

CVE-2023-36624

Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a p...

Vulnerability Description

Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a password requirement.

CVSS Score

7.8

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
LoxoneMiniserver Go Gen 2 Firmware<= 14.0.3.28
LoxoneMiniserver Go Gen 2-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-36624?

CVE-2023-36624 is a vulnerability with a CVSS score of 7.8 (HIGH). Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a p...

How severe is CVE-2023-36624?

CVE-2023-36624 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-36624?

Check the references section above for vendor advisories and patch information. Affected products include: Loxone Miniserver Go Gen 2 Firmware, Loxone Miniserver Go Gen 2.