CVE-2023-43744
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
08/12/2023
Last modified:
13/12/2023
Description
An OS command injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an administrator to execute arbitrary OS commands via a file name parameter in a patch application function. The Zultys MX Administrator client has a "Patch Manager" section that allows administrators to apply patches to the device. The user supplied filename for the patch file is passed to a shell script without validation. Including bash command substitution characters in a patch file name results in execution of the provided command.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:* | 16.0.4 (excluding) | |
| cpe:2.3:o:zultys:mx-se_firmware:*:*:*:*:*:*:*:* | 17.0.6 (including) | 17.0.10 (excluding) |
| cpe:2.3:h:zultys:mx-se:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:* | 16.0.4 (excluding) | |
| cpe:2.3:o:zultys:mx-se_ii_firmware:*:*:*:*:*:*:*:* | 17.0.6 (including) | 17.0.10 (excluding) |
| cpe:2.3:h:zultys:mx-se_ii:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:* | 16.0.4 (excluding) | |
| cpe:2.3:o:zultys:mx-e_firmware:*:*:*:*:*:*:*:* | 17.0.6 (including) | 17.0.10 (excluding) |
| cpe:2.3:h:zultys:mx-e:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:* | 16.0.4 (excluding) | |
| cpe:2.3:o:zultys:mx-virtual_firmware:*:*:*:*:*:*:*:* | 17.0.6 (including) | 17.0.10 (excluding) |
| cpe:2.3:h:zultys:mx-virtual:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:* | 16.0.4 (excluding) | |
| cpe:2.3:o:zultys:mx250_firmware:*:*:*:*:*:*:*:* | 17.0.6 (including) | 17.0.10 (excluding) |
| cpe:2.3:h:zultys:mx250:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



