CVE-2023-3698 affects ASUSTOR's ADM platform versions 4.0.6.RIS1, 4.1.0, and below, and 4.2.2.RI61 and below. It allows remote attackers to delete files via a command injection flaw.
This CVE-2023-3698 was published by ASUSTOR1 on August 17, 2023. It affects the Printer Service on ASUSTOR's ADM platform, specifically versions 4.0.6.RIS1, 4.1.0, and below, as well as 4.2.2.RI61 and below.
Understanding CVE-2023-3698
This vulnerability involves a command injection issue in the Printer Service of ADM. It allows remote unauthorized users to bypass the intended directory structure and delete files.
What is CVE-2023-3698?
Printer service fails to adequately handle user input, enabling remote unauthorized users to navigate beyond the intended directory structure and delete files. Affected products and versions include ADM 4.0.6.RIS1, 4.1.0, and below, as well as ADM 4.2.2.RI61 and below.
The Impact of CVE-2023-3698
The impact of this vulnerability is classified as high, with a CVSSv3.1 base score of 8.5. The exploit allows attackers to perform path traversal attacks, compromising confidentiality, integrity, and availability.
Technical Details of CVE-2023-3698
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability in the Printer Service allows remote unauthorized users to execute commands beyond the intended directory structure, leading to file deletions.
Affected Systems and Versions
ADM versions 4.0.6.RIS1, 4.1.0, and below, as well as 4.2.2.RI61 and below, are affected by this vulnerability.
Exploitation Mechanism
Attackers can exploit the vulnerability by manipulating user input to execute unauthorized commands, bypassing the intended directory structure.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-3698, immediate steps should be taken to secure the affected systems and prevent unauthorized access.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
ASUSTOR has provided a security advisory detailing the vulnerability and guidance on how to patch the affected systems. It is crucial to follow the recommendations provided by the vendor to secure the environment.