CVE-2023-41255

The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network.
References
Link Resource
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:boschrexroth:ctrlx_hmi_web_panel_wr2107:-:*:*:*:*:*:*:*
cpe:2.3:o:boschrexroth:ctrlx_hmi_web_panel_wr2107_firmware:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:h:boschrexroth:ctrlx_hmi_web_panel_wr2110:-:*:*:*:*:*:*:*
cpe:2.3:o:boschrexroth:ctrlx_hmi_web_panel_wr2110_firmware:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:h:boschrexroth:ctrlx_hmi_web_panel_wr2115:-:*:*:*:*:*:*:*
cpe:2.3:o:boschrexroth:ctrlx_hmi_web_panel_wr2115_firmware:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-10-25 18:17

Updated : 2023-11-06 14:33


NVD link : CVE-2023-41255

Mitre link : CVE-2023-41255

CVE.ORG link : CVE-2023-41255


JSON object : View

Products Affected

boschrexroth

  • ctrlx_hmi_web_panel_wr2107_firmware
  • ctrlx_hmi_web_panel_wr2110
  • ctrlx_hmi_web_panel_wr2115
  • ctrlx_hmi_web_panel_wr2107
  • ctrlx_hmi_web_panel_wr2115_firmware
  • ctrlx_hmi_web_panel_wr2110_firmware
CWE
CWE-306

Missing Authentication for Critical Function