CVE-2023-35830
moderate-risk
Published 2023-06-29
STW (aka Sensor-Technik Wiedemann) TCG-4 Connectivity Module DeploymentPackage_v3.03r0-Impala and DeploymentPackage_v3.04r2-Jellyfish and TCG-4lite Connectivity Module DeploymentPackage_v3.04r2-Jellyfish allow an attacker to gain full remote access with root privileges without the need for authentication, giving an attacker arbitrary remote code execution over LTE / 4G network via SMS.
Do I need to act?
~
2.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (5)
Tcg-4 Firmware
Tcg-4 Firmware
Tcg-4 Firmware
Tcg-4 Firmware
Tcg-4Lite Firmware
Affected Vendors
References (4)
Vendor Advisory
https://www.stw-mobile-machines.com/psirt/
Vendor Advisory
https://www.stw-mobile-machines.com/psirt/
49
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
5/34 · Minimal
Exposure
12/34 · Low