Vulnerability Description
A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Prosafe Network Management System | < 1.7.0.31 |
Related Weaknesses (CWE)
References
- https://kb.netgear.com/000065885/Security-Advisory-for-Vertical-Privilege-EscalaVendor Advisory
- https://www.tenable.com/security/research/tra-2023-39ExploitVendor Advisory
- https://kb.netgear.com/000065885/Security-Advisory-for-Vertical-Privilege-EscalaVendor Advisory
- https://www.tenable.com/security/research/tra-2023-39ExploitVendor Advisory
FAQ
What is CVE-2023-49694?
CVE-2023-49694 is a vulnerability with a CVSS score of 7.8 (HIGH). A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user ca...
How severe is CVE-2023-49694?
CVE-2023-49694 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49694?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Prosafe Network Management System.