An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.
References
| Link | Resource |
|---|---|
| http://milesight.com | Product |
| http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html | |
| http://ur5x.com | Broken Link Not Applicable |
| https://github.com/win3zz/CVE-2023-43261 | Exploit Third Party Advisory |
| https://medium.com/%40win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf | |
| https://support.milesight-iot.com/support/home | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
05 Feb 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2023-10-04 12:15
Updated : 2024-02-05 17:15
NVD link : CVE-2023-43261
Mitre link : CVE-2023-43261
CVE.ORG link : CVE-2023-43261
JSON object : View
Products Affected
milesight
- ur35
- ur41_firmware
- ur32_firmware
- ur32
- ur35_firmware
- ur51
- ur41
- ur32l
- ur5x_firmware
- ur52
- ur32l_firmware
- ur55
CWE
CWE-532
Insertion of Sensitive Information into Log File
