CVE-2023-4523 (GCVE-0-2023-4523)
Vulnerability from cvelistv5 – Published: 2023-09-27 18:08 – Updated: 2025-01-16 21:29
VLAI?
Title
Real Time Automation 460 Series Cross-site Scripting
Summary
Real Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway's HTTP interface would redirect to the main page, which is index.htm.
Severity ?
9.4 (Critical)
CWE
- CWE-79 - Cross-site Scripting
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Real Time Automation | 460 Series |
Affected:
0 , < v8.9.8
(custom)
|
Credits
CISA discovered public proof of concept as authored by Yehia Elghaly.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:31:06.157Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4523",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T21:22:53.987113Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:29:44.293Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "460 Series",
"vendor": "Real Time Automation",
"versions": [
{
"lessThan": "v8.9.8",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "CISA discovered public proof of concept as authored by Yehia Elghaly."
}
],
"datePublic": "2023-09-21T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\u003c/span\u003e\n\n"
}
],
"value": "\nReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross-site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-27T18:08:26.220Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eReal Time Automation recommends users download and apply the new version of their product. To update the software, \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003econtact Real Time Automation\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;directly for assistance.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nReal Time Automation recommends users download and apply the new version of their product. To update the software, contact Real Time Automation\u00a0directly for assistance.\n\n\n"
}
],
"source": {
"advisory": "ICSA-23-264-01",
"discovery": "EXTERNAL"
},
"title": "Real Time Automation 460 Series Cross-site Scripting",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-4523",
"datePublished": "2023-09-27T18:08:26.220Z",
"dateReserved": "2023-08-24T17:52:27.663Z",
"dateUpdated": "2025-01-16T21:29:44.293Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:rtautomation:460_series_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.9.8\", \"matchCriteriaId\": \"C4FDC938-0147-4234-A952-0787C371E2DE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rtautomation:460etcmm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D1F8BBC-0375-4EF8-A2B7-06CAE092672E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rtautomation:460mcbms:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4B3529A-8801-4703-BC36-224F58E314B4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rtautomation:460mcbs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3677DE5-0183-41AB-9A47-AA7413B55948\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rtautomation:460mmbms:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CACBF19-7A0A-4632-985C-44A677454F52\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rtautomation:460mmbs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F5B7AC-5BD2-432D-91FE-BACB5DABAFD3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"\\nReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Los productos Real Time Automation Serie 460 con versiones anteriores a la v8.9.8 son vulnerables a Cross-Site Scripting (XSS), lo que podr\\u00eda permitir a un atacante ejecutar cualquier referencia de JavaScript desde la cadena URL. Si esto ocurriera, la interfaz HTTP de la puerta de enlace redirigir\\u00eda a la p\\u00e1gina principal, que es index.htm.\"}]",
"id": "CVE-2023-4523",
"lastModified": "2024-11-21T08:35:20.773",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\", \"baseScore\": 9.4, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
"published": "2023-09-27T19:15:12.373",
"references": "[{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-4523\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2023-09-27T19:15:12.373\",\"lastModified\":\"2024-11-21T08:35:20.773\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Los productos Real Time Automation Serie 460 con versiones anteriores a la v8.9.8 son vulnerables a Cross-Site Scripting (XSS), lo que podr\u00eda permitir a un atacante ejecutar cualquier referencia de JavaScript desde la cadena URL. Si esto ocurriera, la interfaz HTTP de la puerta de enlace redirigir\u00eda a la p\u00e1gina principal, que es index.htm.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\",\"baseScore\":9.4,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":5.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rtautomation:460_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.8\",\"matchCriteriaId\":\"C4FDC938-0147-4234-A952-0787C371E2DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460etcmm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1F8BBC-0375-4EF8-A2B7-06CAE092672E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460mcbms:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B3529A-8801-4703-BC36-224F58E314B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460mcbs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3677DE5-0183-41AB-9A47-AA7413B55948\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460mmbms:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CACBF19-7A0A-4632-985C-44A677454F52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rtautomation:460mmbs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F5B7AC-5BD2-432D-91FE-BACB5DABAFD3\"}]}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"product\": \"460 Series\", \"vendor\": \"Real Time Automation\", \"versions\": [{\"lessThan\": \"v8.9.8\", \"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\"}]}], \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"CISA discovered public proof of concept as authored by Yehia Elghaly.\"}], \"datePublic\": \"2023-09-21T17:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\u003c/span\u003e\\n\\n\"}], \"value\": \"\\nReal Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway\u0027s HTTP interface would redirect to the main page, which is index.htm.\\n\\n\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"LOW\", \"baseScore\": 9.4, \"baseSeverity\": \"CRITICAL\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-79\", \"description\": \"CWE-79 Cross-site Scripting\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2023-09-27T18:08:26.220Z\"}, \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01\"}], \"solutions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eReal Time Automation recommends users download and apply the new version of their product. To update the software, \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\"\u003econtact Real Time Automation\u003c/a\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;directly for assistance.\u003c/span\u003e\\n\\n\u003cbr\u003e\"}], \"value\": \"\\nReal Time Automation recommends users download and apply the new version of their product. To update the software, contact Real Time Automation\\u00a0directly for assistance.\\n\\n\\n\"}], \"source\": {\"advisory\": \"ICSA-23-264-01\", \"discovery\": \"EXTERNAL\"}, \"title\": \"Real Time Automation 460 Series Cross-site Scripting\", \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T07:31:06.157Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-4523\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-16T21:22:53.987113Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-16T21:22:56.088Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2023-4523\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"icscert\", \"dateReserved\": \"2023-08-24T17:52:27.663Z\", \"datePublished\": \"2023-09-27T18:08:26.220Z\", \"dateUpdated\": \"2025-01-16T21:29:44.293Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…