Vulnerability Description
The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Socomec | Modulys Gp Firmware | 01.12.10 |
| Socomec | Modulys Gp | - |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03Third Party AdvisoryUS Government Resource
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2023-40221?
CVE-2023-40221 is a vulnerability with a CVSS score of 8.8 (HIGH). The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legit...
How severe is CVE-2023-40221?
CVE-2023-40221 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-40221?
Check the references section above for vendor advisories and patch information. Affected products include: Socomec Modulys Gp Firmware, Socomec Modulys Gp.