Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-34999: Remote Code Execution in RTS VLink Virtual Matrix

A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.

CVE
#vulnerability#web#windows#rce#pdf#sap

Advisory Information

  • Advisory ID: BOSCH-SA-893251-BT
  • CVE Numbers and CVSS v3.1 Scores:
    • CVE-2023-34999
      • Base Score: 8.4 (High)
  • Published: 30 Aug 2023
  • Last Updated: 30 Aug 2023

Summary

A security vulnerability has been uncovered in the admin interface of the RTS VLink Virtual Matrix Software. The vulnerability will allow a Remote Code Execution (RCE) attack.

Versions v5 (< 5.7.6) and v6 (< 6.5.0) of the RTS VLink Virtual Matrix Software are affected by this vulnerability. Older versions are not affected.

The vulnerability has been uncovered and disclosed responsibly by an external team of researchers.

Affected Products

  • RTS VLink Virtual Matrix Software on: Windows
    • CVE-2023-34999
      • Version(s): 5.0.0 - 5.7.6 (excluding)
      • Version(s): 6.0.0 - 6.5.0 (excluding)

Solution and Mitigations****Solution

Update the VLink Virtual Matrix Software to version 5.7.6 if you are currently using a v5 version.

Update the VLink Virtual Matrix Software to version 6.5.0 if you are currently using a v6 version.

To ensure the security of your system, we strongly recommend that you update your software to the latest version. Instructions for downloading and updating your system may be found at https://products.rtsintercoms.com/binary/VLink_Upgrade_Instructions.pdf

Mitigations

If updating is not possible it is strongly advised to change the admin password of the RTS VLink Virtual Matrix Software if it is still set to the default password.

Blocking the web interface ports (80 and 443) of the RTS VLink Virtual Matrix Software in a firewall will prevent the vulnerability from being misused from a remote location.

In all cases it is still strongly advised to perform the update as soon as possible since that will remove the vulnerability.

Vulnerability Details****CVE-2023-34999

CVE description: A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.

  • Problem Type:
    • CWE-94 Improper Control of Generation of Code (‘Code Injection’)
  • CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
    • Base Score: 8.4 (High)

Remarks****Security Update Information

With respect to Directive (EU) 2019/770 and Directive (EU) 2019/771 and their national transposition laws, please note:

It is your responsibility to download and/or install any security updates provided by us, for example to maintain product or data security. If you fail to install a security update provided to you within a reasonable period of time, we will not be liable for any product defect solely due to the absence of such security update.

Alternatively, we are entitled to directly download and/or install security updates regardless of your settings. In these cases, we will provide you with the relevant information, e.g. in this security advisory.

CVSS Scoring

Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.

Additional Resources

  • [1] VLink Upgrade Instructions: https://products.rtsintercoms.com/binary/VLink_Upgrade_Instructions.pdf
  • [2] VLink Software version 5.7.6: https://products.rtsintercoms.com/binary/VLink_Virtual_Matrix_v576_230729.zip
  • [3] VLink Software version 6.5.0: https://products.rtsintercoms.com/binary/VLink_Virtual_Matrix_v650_230811.zip

Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: [email protected] .

Revision History

  • 30 Aug 2023: Initial Publication

Appendix****Material List

Please find the SAP Number and CTN of the affected products below.

SAP Number

CTN

F.01U.216.945

VLINK-8

F.01U.216.946

VLINK-8UPG

F.01U.264.751

VLINK-2EXP

F.01U.388.141

VLINK-8REDNT

F.01U.388.142

VLINK-1RENTAL

F.01U.388.143

VLINK-2REDNT

F.01U.388.144

VLINK-8SIP

F.01U.388.145

VLINK-2SIP

F.01U.388.146

VLINK-8SIPREDNT

F.01U.388.148

VLINK-2SIPREDNT

F.01U.393.239

VLINK-SVU

F.01U.393.240

VLINK-Lite

F.01U.393.241

VLINK-LiteUPG

F.01U.393.242

VLINK-VIDEO

F.01U.393.243

VLINK-VIDEO I/O

F.01U.393.244

VLINK-REC

F.01U.393.245

VLINK-ENCRYPT

F.01U.396.977

VLINK-8 SPACE

F.01U.396.978

VLINK-2 EXSPACE

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907