Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-05-22 20:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31245
Mitre link : CVE-2023-31245
CVE.ORG link : CVE-2023-31245
JSON object : View
Products Affected
control4
- ca-1
- ea-3
- ea-1
- ea-5
- ca-10
snapone
- orvc
- an-110-rt-2l1w
- pakedge_rt-3100
- pakedge_wr-1
- pakedge_rk-1
- an-110-rt-2l1w-wifi
- an-310-rt-4l2w
- ovrc-300-pro
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')