CVE-2023-28386

Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*
OR cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*

History

09 Dec 2024, 18:15

Type Values Removed Values Added
References (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes () https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes
References (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource
Summary Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution. Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.
CWE CWE-345 CWE-354

27 May 2023, 01:59

Type Values Removed Values Added
First Time Control4
Snapone pakedge Rk-1
Control4 ca-10
Snapone
Snapone an-310-rt-4l2w
Snapone orvc
Snapone pakedge Wr-1
Snapone an-110-rt-2l1w
Snapone pakedge Rt-3100
Control4 ea-5
Control4 ea-1
Control4 ea-3
Control4 ca-1
Snapone an-110-rt-2l1w-wifi
Snapone ovrc-300-pro
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes
References (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource
CPE cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*
cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*
cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*

22 May 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-22 20:15

Updated : 2024-12-09 18:15


NVD link : CVE-2023-28386

Mitre link : CVE-2023-28386


JSON object : View

Products Affected

snapone

  • pakedge_rk-1
  • an-310-rt-4l2w
  • ovrc-300-pro
  • an-110-rt-2l1w-wifi
  • orvc
  • pakedge_wr-1
  • pakedge_rt-3100
  • an-110-rt-2l1w

control4

  • ea-5
  • ea-3
  • ca-1
  • ea-1
  • ca-10
CWE
CWE-354

Improper Validation of Integrity Check Value