CVE-2023-6317

A prompt bypass exists in the secondscreen.gateway service running on webOS version 4 through 7. An attacker can create a privileged account without asking the user for the security PIN.  Full versions and TV models affected: webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA webOS 5.5.0 - 04.50.51 running on OLED55CXPUA webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB   webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:lg:webos:4.9.7:*:*:*:*:*:*:*
cpe:2.3:h:lg:lg43um7000pla:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:lg:webos:5.5.0:*:*:*:*:*:*:*
cpe:2.3:h:lg:oled55cxpua:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:lg:webos:6.3.3-442:*:*:*:*:*:*:*
cpe:2.3:h:lg:oled48c1pub:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:lg:webos:7.3.1-43:*:*:*:*:*:*:*
cpe:2.3:h:lg:oled55a23la:-:*:*:*:*:*:*:*

History

07 Feb 2025, 18:39

Type Values Removed Values Added
First Time Lg oled55cxpua
Lg oled55a23la
Lg webos
Lg
Lg oled48c1pub
Lg lg43um7000pla
References () https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/ - () https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/ - Exploit, Third Party Advisory
References () https://lgsecurity.lge.com/bulletins/tv#updateDetails - () https://lgsecurity.lge.com/bulletins/tv#updateDetails - Vendor Advisory
CPE cpe:2.3:h:lg:oled55cxpua:-:*:*:*:*:*:*:*
cpe:2.3:o:lg:webos:4.9.7:*:*:*:*:*:*:*
cpe:2.3:h:lg:oled48c1pub:-:*:*:*:*:*:*:*
cpe:2.3:o:lg:webos:6.3.3-442:*:*:*:*:*:*:*
cpe:2.3:h:lg:oled55a23la:-:*:*:*:*:*:*:*
cpe:2.3:h:lg:lg43um7000pla:-:*:*:*:*:*:*:*
cpe:2.3:o:lg:webos:5.5.0:*:*:*:*:*:*:*
cpe:2.3:o:lg:webos:7.3.1-43:*:*:*:*:*:*:*

Information

Published : 2024-04-09 14:15

Updated : 2025-02-07 18:39


NVD link : CVE-2023-6317

Mitre link : CVE-2023-6317

CVE.ORG link : CVE-2023-6317


JSON object : View

Products Affected

lg

  • oled55cxpua
  • webos
  • oled48c1pub
  • lg43um7000pla
  • oled55a23la
CWE
CWE-639

Authorization Bypass Through User-Controlled Key