Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-3698 : Security Advisory and Response

CVE-2023-3698 affects ASUSTOR's ADM platform versions 4.0.6.RIS1, 4.1.0, and below, and 4.2.2.RI61 and below. It allows remote attackers to delete files via a command injection flaw.

This CVE-2023-3698 was published by ASUSTOR1 on August 17, 2023. It affects the Printer Service on ASUSTOR's ADM platform, specifically versions 4.0.6.RIS1, 4.1.0, and below, as well as 4.2.2.RI61 and below.

Understanding CVE-2023-3698

This vulnerability involves a command injection issue in the Printer Service of ADM. It allows remote unauthorized users to bypass the intended directory structure and delete files.

What is CVE-2023-3698?

Printer service fails to adequately handle user input, enabling remote unauthorized users to navigate beyond the intended directory structure and delete files. Affected products and versions include ADM 4.0.6.RIS1, 4.1.0, and below, as well as ADM 4.2.2.RI61 and below.

The Impact of CVE-2023-3698

The impact of this vulnerability is classified as high, with a CVSSv3.1 base score of 8.5. The exploit allows attackers to perform path traversal attacks, compromising confidentiality, integrity, and availability.

Technical Details of CVE-2023-3698

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability in the Printer Service allows remote unauthorized users to execute commands beyond the intended directory structure, leading to file deletions.

Affected Systems and Versions

ADM versions 4.0.6.RIS1, 4.1.0, and below, as well as 4.2.2.RI61 and below, are affected by this vulnerability.

Exploitation Mechanism

Attackers can exploit the vulnerability by manipulating user input to execute unauthorized commands, bypassing the intended directory structure.

Mitigation and Prevention

To mitigate the risks associated with CVE-2023-3698, immediate steps should be taken to secure the affected systems and prevent unauthorized access.

Immediate Steps to Take

        Apply the security patches released by ASUSTOR to address the vulnerability.
        Restrict network access to the affected Printer Service to trusted users only.
        Monitor network traffic for any suspicious activities that may indicate exploitation attempts.

Long-Term Security Practices

        Regularly update and patch the software and firmware of the ADM platform to prevent future vulnerabilities.
        Conduct regular security assessments and audits to identify and address any new security risks.
        Educate users on safe computing practices and the importance of security updates.

Patching and Updates

ASUSTOR has provided a security advisory detailing the vulnerability and guidance on how to patch the affected systems. It is crucial to follow the recommendations provided by the vendor to secure the environment.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now