HIGH · 8.8

CVE-2023-40221

The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legit...

Vulnerability Description

The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
SocomecModulys Gp Firmware01.12.10
SocomecModulys Gp-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-40221?

CVE-2023-40221 is a vulnerability with a CVSS score of 8.8 (HIGH). The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legit...

How severe is CVE-2023-40221?

CVE-2023-40221 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-40221?

Check the references section above for vendor advisories and patch information. Affected products include: Socomec Modulys Gp Firmware, Socomec Modulys Gp.