Schweitzer Engineering Laboratories Real Time Automation Controller 安全漏洞
CVE编号
CVE-2023-31163利用情况
暂无补丁情况
N/A披露时间
2023-05-11漏洞描述
Schweitzer Engineering Laboratories Real Time Automation Controller(SEL RTAC)是美国Schweitzer Engineering Laboratories公司的一个功能强大的多功能自动化平台。 Schweitzer Engineering Laboratories Real Time Automation Controller存在安全漏洞,该漏洞源于Web 界面中的存在不当输入验证,远程攻击者利用该漏洞可以注入和执行任意脚本代码。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://selinc.com/support/security-notifications/external-reports/ | |
https://www.nozominetworks.com/blog/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | selinc | sel-2241_rtac_module_firmware | * | From (including) r113-v0 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3350_firmware | * | From (including) r148-v0 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3505-3_firmware | * | From (including) r132-v0 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3505_firmware | * | From (including) r119-v0 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3530-4_firmware | * | From (including) r108-v0 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3530_firmware | * | From (including) r100-v0 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3532_firmware | * | From (including) r132-v0 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3555_firmware | * | From (including) r134-v0 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3560e_firmware | * | From (including) r144-v2 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
系统 | selinc | sel-3560s_firmware | * | From (including) r144-v2 | Up to (excluding) r150-v2 | ||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-2241_rtac_module | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3350 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3505 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3505-3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3530 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3530-4 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3532 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3555 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3560e | - | - | |||||
运行在以下环境 | |||||||||
硬件 | selinc | sel-3560s | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-79 | 在Web页面生成时对输入的转义处理不恰当(跨站脚本) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论