CVE-2023-36607

Vulnerability updated 2 months ago (2024-11-29T14:03:58.295Z)
Download STIX
Preview STIX
CVE-2023-36607 is a significant software vulnerability identified in multiple TBox versions, including TG2, LT2, RM2, MS-CPU32, and MS-CPU32-S2, all of which are affected at version 1.50.598 and prior. This flaw pertains to the design or implementation of the software, potentially allowing unauthorized access or control. The National Vulnerability Database (NVD) has officially recognized and recorded this vulnerability, providing comprehensive details on its website. The specific nature of CVE-2023-36607 involves SSH access through the integrated firewall, as well as the user account SSH access. When exploited, this vulnerability could allow an attacker to gain unauthorized access to the system, posing a serious security threat. To mitigate this risk, users are advised to disable SSH access through the integrated firewall and disable the user account SSH access by emptying its password in the application. This vulnerability represents a critical issue for all users running the aforementioned TBox versions. Immediate action is required to minimize potential risks associated with CVE-2023-36607. Users are strongly encouraged to implement the provided mitigation steps and continuously monitor updates from the NVD and TBox for further instructions or patches to fully resolve this vulnerability.
Description last updated: 2024-05-05T10:19:04.681Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2023-36607 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
2 years ago