Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
| https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
| https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf | Release Notes |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2023-05-22 20:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31245
Mitre link : CVE-2023-31245
CVE.ORG link : CVE-2023-31245
JSON object : View
Products Affected
control4
- ea-5
- ca-10
- ea-1
- ca-1
- ea-3
snapone
- an-110-rt-2l1w-wifi
- an-310-rt-4l2w
- pakedge_rk-1
- pakedge_wr-1
- orvc
- pakedge_rt-3100
- ovrc-300-pro
- an-110-rt-2l1w
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
