{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6248","assignerOrgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","state":"PUBLISHED","assignerShortName":"ASRG","dateReserved":"2023-11-21T21:48:18.990Z","datePublished":"2023-11-21T21:49:35.831Z","dateUpdated":"2024-10-17T18:01:16.523Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","modules":["Cloud Management System","Telematics Gateway"],"platforms":["ARM","Linux"],"product":"Syrus4 IoT Telematics Gateway","vendor":"Digital Communications Technologies","versions":[{"status":"affected","version":"apex-23.43.2"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Yashin Mehaboobe"}],"datePublic":"2023-11-24T09:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations:</div><div><ul><li>Get location data of the vehicle the device is connected to</li><li>Send CAN bus messages via the ECU module (<a target=\"_blank\" rel=\"nofollow\" href=\"https://syrus.digitalcomtech.com/docs/ecu-1\">https://syrus.digitalcomtech.com/docs/ecu-1</a>)<br></li><li>Immobilize the vehicle via the safe-immobilizer module (<a target=\"_blank\" rel=\"nofollow\" href=\"https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization\">https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization</a>)<br></li><li>Get live video through the connected video camera<br></li><li>Send audio messages to the driver (<a target=\"_blank\" rel=\"nofollow\" href=\"https://syrus.digitalcomtech.com/docs/system-tools#apx-tts\">https://syrus.digitalcomtech.com/docs/system-tools#apx-tts</a>)<br></li></ul></div>"}],"value":"The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations:\n\n  *  Get location data of the vehicle the device is connected to\n  *  Send CAN bus messages via the ECU module ( https://syrus.digitalcomtech.com/docs/ecu-1 https://syrus.digitalcomtech.com/docs/ecu-1 )\n\n  *  Immobilize the vehicle via the safe-immobilizer module ( https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization )\n\n  *  Get live video through the connected video camera\n\n  *  Send audio messages to the driver ( https://syrus.digitalcomtech.com/docs/system-tools#apx-tts https://syrus.digitalcomtech.com/docs/system-tools#apx-tts )\n\n\n\n\n\n"}],"impacts":[{"capecId":"CAPEC-175","descriptions":[{"lang":"en","value":"CAPEC-175 Code Inclusion"}]},{"capecId":"CAPEC-116","descriptions":[{"lang":"en","value":"CAPEC-116 Excavation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-287","description":"CWE-287 Improper Authentication","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-319","description":"CWE-319 Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-200","description":"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","shortName":"ASRG","dateUpdated":"2023-11-21T21:49:35.831Z"},"references":[{"tags":["product"],"url":"https://www.digitalcomtech.com/product/syrus-4g-iot-telematics-gateway/"}],"source":{"discovery":"UNKNOWN"},"timeline":[{"lang":"en","time":"2023-04-15T23:15:00.000Z","value":"Initial email to vendor"},{"lang":"en","time":"2023-04-25T23:37:00.000Z","value":"Follow up email due to no response from vendor"},{"lang":"en","time":"2023-04-26T20:58:00.000Z","value":"Response from vendor to use support channel"},{"lang":"en","time":"2023-04-26T22:00:00.000Z","value":"Details provided to the vendor via support channel"},{"lang":"en","time":"2023-05-31T22:00:00.000Z","value":"No response from vendor. Request for confirmation"},{"lang":"en","time":"2023-08-22T22:00:00.000Z","value":"Support ticket discarded"},{"lang":"en","time":"2023-10-28T22:00:00.000Z","value":"Additional request for confirmation. No response from vendor."}],"title":"Data leakage and arbitrary remote code execution in Syrus cloud devices","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:21:17.995Z"},"title":"CVE Program Container","references":[{"tags":["product","x_transferred"],"url":"https://www.digitalcomtech.com/product/syrus-4g-iot-telematics-gateway/"}]},{"affected":[{"vendor":"digitalcomtech","product":"syrus_4g_iot_telematics_gateway_firmware","cpes":["cpe:2.3:o:digitalcomtech:syrus_4g_iot_telematics_gateway_firmware:apex-23.43.2:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"apex-23.43.2","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-15T17:36:17.604517Z","id":"CVE-2023-6248","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-17T18:01:16.523Z"}}]}}