An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.
References
Link | Resource |
---|---|
http://milesight.com | Product |
http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html | |
http://ur5x.com | Broken Link Not Applicable |
https://github.com/win3zz/CVE-2023-43261 | Exploit Third Party Advisory |
https://medium.com/%40win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf | |
https://support.milesight-iot.com/support/home | Product |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
No history.
Information
Published : 2023-10-04 12:15
Updated : 2024-02-05 17:15
NVD link : CVE-2023-43261
Mitre link : CVE-2023-43261
CVE.ORG link : CVE-2023-43261
JSON object : View
Products Affected
milesight
- ur32_firmware
- ur5x_firmware
- ur35_firmware
- ur41_firmware
- ur32
- ur51
- ur32l
- ur41
- ur32l_firmware
- ur35
- ur55
- ur52
CWE
CWE-532
Insertion of Sensitive Information into Log File