{"vulnerability": "CVE-2023-4464", "sightings": [{"uuid": "54f272aa-0c64-4fc1-8581-67e8bf6ab244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4464", "type": "seen", "source": "https://t.me/cibsecurity/73931", "content": "\u203c\ufe0fCVE-2023-4464\u203c\ufe0f\n\nA vulnerability, which was classified as critical, has been found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. This issue affects some unknown processing of the component Diagnostic Telnet Mode. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB249257 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:37:09.000000Z"}, {"uuid": "385b58ea-f26d-4145-a66f-db122dc784d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4464", "type": "seen", "source": "https://t.me/ctinow/160433", "content": "https://ift.tt/0hbNIC3\nCVE-2023-4464", "creation_timestamp": "2023-12-29T11:26:31.000000Z"}, {"uuid": "9d06f62e-58de-42f9-8a0d-c8822d9099d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4464", "type": "seen", "source": "https://t.me/ctinow/160411", "content": "https://ift.tt/jCBNs0q\nCVE-2023-4464 | Poly CCX 400/CCX 600/Trio 8800/Trio C60 Diagnostic Telnet Mode os command injection (MZ-23-01)", "creation_timestamp": "2023-12-29T10:46:40.000000Z"}]}