CVE-2023-6248

CVSS 3.1 Score 10.0 of 10 (high)

Details

Published Nov 21, 2023
Updated: Dec 4, 2023
CWE ID 319
CWE ID 94
CWE ID 287
CWE ID 200

Summary

CVE-2023-6248 is a critical vulnerability that affects the Syrus4 IoT gateway. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on any Syrus4 device connected to the cloud service. The vulnerability is caused by an unsecured MQTT server that also leaks sensitive data such as location, video, and diagnostic information from each connected device. Attackers who know the IP address of the server can perform various operations, including obtaining location data, sending CAN bus messages, immobilizing vehicles, accessing live video, and sending audio messages to drivers. This vulnerability poses a high risk to organizations using Syrus4 devices as it allows attackers to gain unauthorized control over vehicles and access sensitive data. To remediate this issue, it is recommended to secure the MQTT server and apply patches or updates provided by the vendor.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-6248 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions