Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-47611 Explained : Impact and Mitigation

Learn about CVE-2023-47611, a high-risk vulnerability in Telit Cinterion devices allowing privilege escalation. Find mitigation steps and firmware updates.

This article provides detailed information on CVE-2023-47611, a vulnerability affecting Telit Cinterion devices.

Understanding CVE-2023-47611

CVE-2023-47611 is a CWE-269: Improper Privilege Management vulnerability found in various Telit Cinterion products.

What is CVE-2023-47611?

Telit Cinterion devices are impacted by a privilege escalation flaw that could allow a local attacker to elevate privileges to "manufacturer" level on the system.

The Impact of CVE-2023-47611

The vulnerability poses a high risk, with a CVSS base score of 7.8, potentially leading to unauthorized access and control of affected devices.

Technical Details of CVE-2023-47611

The vulnerability affects Telit Cinterion BGS5, EHS5/6/8, PDS5/6/8, ELS61/81, and PLS62 devices.

Vulnerability Description

The issue stems from improper privilege management, enabling attackers to escalate privileges locally.

Affected Systems and Versions

Multiple Telit Cinterion products are impacted, with specific firmware versions susceptible to exploitation.

Exploitation Mechanism

The vulnerability allows low privileged local attackers to gain unauthorized access and control over the targeted device.

Mitigation and Prevention

Telit Cinterion has provided solutions and workarounds to address CVE-2023-47611.

Immediate Steps to Take

        Update firmware with patches released by Telit Cinterion.
        Contact Telit Cinterion for further assistance.

Long-Term Security Practices

        Enforce application signature verification to prevent the installation of unauthorized software.
        Ensure physical security to mitigate the risk of backdoor installations.
        Regularly update device firmware and security mechanisms.

Patching and Updates

Telit Cinterion has released firmware updates to address the vulnerability.

For more details, refer to the original advisory by Kaspersky ICS CERT.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now