Learn about CVE-2023-47611, a high-risk vulnerability in Telit Cinterion devices allowing privilege escalation. Find mitigation steps and firmware updates.
This article provides detailed information on CVE-2023-47611, a vulnerability affecting Telit Cinterion devices.
Understanding CVE-2023-47611
CVE-2023-47611 is a CWE-269: Improper Privilege Management vulnerability found in various Telit Cinterion products.
What is CVE-2023-47611?
Telit Cinterion devices are impacted by a privilege escalation flaw that could allow a local attacker to elevate privileges to "manufacturer" level on the system.
The Impact of CVE-2023-47611
The vulnerability poses a high risk, with a CVSS base score of 7.8, potentially leading to unauthorized access and control of affected devices.
Technical Details of CVE-2023-47611
The vulnerability affects Telit Cinterion BGS5, EHS5/6/8, PDS5/6/8, ELS61/81, and PLS62 devices.
Vulnerability Description
The issue stems from improper privilege management, enabling attackers to escalate privileges locally.
Affected Systems and Versions
Multiple Telit Cinterion products are impacted, with specific firmware versions susceptible to exploitation.
Exploitation Mechanism
The vulnerability allows low privileged local attackers to gain unauthorized access and control over the targeted device.
Mitigation and Prevention
Telit Cinterion has provided solutions and workarounds to address CVE-2023-47611.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Telit Cinterion has released firmware updates to address the vulnerability.
For more details, refer to the original advisory by Kaspersky ICS CERT.