CVE ID | CVE-2023-42122 |
CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
Control Web Panel |
AFFECTED PRODUCTS |
Control Web Panel |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Control Web Panel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the cwpsrv process, which listens on the loopback interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. |
ADDITIONAL DETAILS |
05/09/23 – ZDI requested a PSIRT contact. 05/10/23 – The vendor provided a contact, and ZDI reported the vulnerability to the vendor. 09/22/23 – ZDI asked for an update and informed the vendor that we intend to publish the case as a zero-day advisory on 09/27/23. -- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application. |
DISCLOSURE TIMELINE |
|
CREDIT | Muhammad Ikhsanudin |