Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource | |
References | () https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes |
31 May 2023, 15:23
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes | |
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource | |
CPE | cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:* cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:* cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
First Time |
Control4 ca-1
Snapone pakedge Rk-1 Control4 ea-1 Snapone ovrc-300-pro Snapone pakedge Wr-1 Control4 ea-5 Snapone Control4 ca-10 Snapone orvc Snapone an-110-rt-2l1w-wifi Control4 Control4 ea-3 Snapone pakedge Rt-3100 Snapone an-110-rt-2l1w Snapone an-310-rt-4l2w |
Information
Published : 2023-05-22 20:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31245
Mitre link : CVE-2023-31245
CVE.ORG link : CVE-2023-31245
JSON object : View
Products Affected
snapone
- pakedge_rk-1
- pakedge_wr-1
- pakedge_rt-3100
- orvc
- an-110-rt-2l1w-wifi
- an-310-rt-4l2w
- ovrc-300-pro
- an-110-rt-2l1w
control4
- ca-10
- ea-5
- ea-3
- ca-1
- ea-1
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')