Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource | |
References | () https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
31 May 2023, 15:23
Type | Values Removed | Values Added |
---|---|---|
First Time |
Snapone an-110-rt-2l1w
Control4 ca-10 Snapone ovrc-300-pro Snapone an-310-rt-4l2w Control4 ea-1 Snapone pakedge Rt-3100 Control4 ea-5 Control4 ea-3 Snapone an-110-rt-2l1w-wifi Snapone orvc Snapone Control4 ca-1 Snapone pakedge Wr-1 Snapone pakedge Rk-1 Control4 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CPE | cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:* cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:* cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:* |
|
References | (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes | |
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource |
22 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-22 20:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31245
Mitre link : CVE-2023-31245
CVE.ORG link : CVE-2023-31245
JSON object : View
Products Affected
snapone
- an-110-rt-2l1w
- pakedge_rt-3100
- pakedge_rk-1
- orvc
- ovrc-300-pro
- an-110-rt-2l1w-wifi
- an-310-rt-4l2w
- pakedge_wr-1
control4
- ea-3
- ea-5
- ca-10
- ea-1
- ca-1
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')