Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource | |
References | () https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
27 May 2023, 01:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Snapone pakedge Rt-3100
Snapone pakedge Wr-1 Control4 ca-1 Control4 ca-10 Control4 Control4 ea-3 Snapone an-110-rt-2l1w Snapone orvc Snapone Control4 ea-5 Snapone pakedge Rk-1 Snapone ovrc-300-pro Snapone an-110-rt-2l1w-wifi Snapone an-310-rt-4l2w Control4 ea-1 |
|
CPE | cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:* cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes | |
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource |
Information
Published : 2023-05-22 20:15
Updated : 2024-11-21 07:54
NVD link : CVE-2023-28386
Mitre link : CVE-2023-28386
CVE.ORG link : CVE-2023-28386
JSON object : View
Products Affected
snapone
- pakedge_rt-3100
- pakedge_wr-1
- pakedge_rk-1
- an-110-rt-2l1w-wifi
- orvc
- an-110-rt-2l1w
- an-310-rt-4l2w
- ovrc-300-pro
control4
- ca-10
- ea-5
- ea-3
- ea-1
- ca-1
CWE
CWE-345
Insufficient Verification of Data Authenticity