CVE-2023-31245

Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*
OR cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*

History

31 May 2023, 15:23

Type Values Removed Values Added
References (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf - Release Notes
References (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource
First Time Control4
Snapone pakedge Rk-1
Control4 ca-10
Snapone
Snapone an-310-rt-4l2w
Snapone orvc
Snapone pakedge Wr-1
Snapone an-110-rt-2l1w
Snapone pakedge Rt-3100
Control4 ea-5
Control4 ea-1
Control4 ea-3
Control4 ca-1
Snapone an-110-rt-2l1w-wifi
Snapone ovrc-300-pro
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*
cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*
cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*
cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*
cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*

22 May 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-22 20:15

Updated : 2023-05-31 15:23


NVD link : CVE-2023-31245

Mitre link : CVE-2023-31245


JSON object : View

Products Affected

snapone

  • pakedge_rk-1
  • an-310-rt-4l2w
  • ovrc-300-pro
  • an-110-rt-2l1w-wifi
  • orvc
  • pakedge_wr-1
  • pakedge_rt-3100
  • an-110-rt-2l1w

control4

  • ea-5
  • ea-3
  • ca-1
  • ea-1
  • ca-10
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')