CVSS 3.1 Score 10.0 of 10 (high)


Published Nov 21, 2023
Updated: Dec 4, 2023
CWE ID 319
CWE ID 287
CWE ID 200


CVE-2023-6248 is a critical vulnerability that affects the Syrus4 IoT gateway. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on any Syrus4 device connected to the cloud service. The vulnerability is caused by an unsecured MQTT server that also leaks sensitive data such as location, video, and diagnostic information from each connected device. Attackers who know the IP address of the server can perform various operations, including obtaining location data, sending CAN bus messages, immobilizing vehicles, accessing live video, and sending audio messages to drivers. This vulnerability poses a high risk to organizations using Syrus4 devices as it allows attackers to gain unauthorized control over vehicles and access sensitive data. To remediate this issue, it is recommended to secure the MQTT server and apply patches or updates provided by the vendor.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-6248 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options