CVE-2023-27917

high-risk
Published 2023-04-11

OS command injection vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker who can access Network Maintenance page to execute arbitrary OS commands with a root privilege. The affected products and versions are as follows: M2M Gateway with the firmware Ver.3.7.10 and earlier (CPS-MG341-ADSC1-111, CPS-MG341-ADSC1-931, CPS-MG341G-ADSC1-111, CPS-MG341G-ADSC1-930, and CPS-MG341G5-ADSC1-931), M2M Controller Integrated Type with firmware Ver.3.7.6 and earlier versions (CPS-MC341-ADSC1-111, CPS-MC341-ADSC1-931, CPS-MC341-ADSC2-111, CPS-MC341G-ADSC1-110, CPS-MC341Q-ADSC1-111, CPS-MC341-DS1-111, CPS-MC341-DS11-111, CPS-MC341-DS2-911, and CPS-MC341-A1-111), and M2M Controller Configurable Type with firmware Ver.3.8.8 and earlier versions (CPS-MCS341-DS1-111, CPS-MCS341-DS1-131, CPS-MCS341G-DS1-130, CPS-MCS341G5-DS1-130, and CPS-MCS341Q-DS1-131).

Do I need to act?

~
1.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
NETWORK / LOW complexity

Affected Products (19)

Cps-Mg341-Adsc1-111 Firmware
Cps-Mg341-Adsc1-931 Firmware
Cps-Mg341G-Adsc1-111 Firmware
Cps-Mg341G-Adsc1-930 Firmware
Cps-Mg341G5-Adsc1-931 Firmware
Cps-Mc341-Adsc1-111 Firmware
Cps-Mc341-Adsc1-931 Firmware
Cps-Mc341-Adsc2-111 Firmware
Cps-Mc341G-Adsc1-110 Firmware
Cps-Mc341Q-Adsc1-111 Firmware
Cps-Mc341-Ds1-111 Firmware
Cps-Mc341-Ds11-111 Firmware
Cps-Mc341-Ds2-911 Firmware
Cps-Mc341-A1-111 Firmware
Cps-Mcs341-Ds1-111 Firmware
Cps-Mcs341-Ds1-131 Firmware
Cps-Mcs341G-Ds1-130 Firmware
Cps-Mcs341G5-Ds1-130 Firmware
Cps-Mcs341Q-Ds1-131 Firmware

Affected Vendors

53
/ 100
high-risk
Severity 30/34 · Critical
Exploitability 4/34 · Minimal
Exposure 19/34 · Moderate