An authentication bypass vulnerability in the web client interface for the CL4NX printer before firmware version 1.13.3-u724_r2 provides remote unauthenticated attackers with access to execute commands intended only for valid/authenticated users, such as file uploads and configuration changes.
References
Link | Resource |
---|---|
https://d2n1rly8br52rx.cloudfront.net/content-blocks/files/pages/Vulnerability-Disclosure.pdf | Vendor Advisory |
https://hackandpwn.com/disclosures/CVE-2023-23594.pdf | Third Party Advisory |
https://www.satoamerica.com/products/printers/industrial-thermal-printers/cl4nx-plus | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
11 Apr 2023, 06:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:sato-global:cl4nx_plus:-:*:*:*:*:*:*:* cpe:2.3:o:sato-global:cl4nx_plus_firmware:*:*:*:*:*:*:*:* |
|
First Time |
Sato-global
Sato-global cl4nx Plus Sato-global cl4nx Plus Firmware |
|
CWE | CWE-863 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://www.satoamerica.com/products/printers/industrial-thermal-printers/cl4nx-plus - Product | |
References | (MISC) https://d2n1rly8br52rx.cloudfront.net/content-blocks/files/pages/Vulnerability-Disclosure.pdf - Vendor Advisory | |
References | (MISC) https://hackandpwn.com/disclosures/CVE-2023-23594.pdf - Third Party Advisory |
04 Apr 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Mar 2023, 19:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-31 19:15
Updated : 2023-12-10 15:01
NVD link : CVE-2023-23594
Mitre link : CVE-2023-23594
CVE.ORG link : CVE-2023-23594
JSON object : View
Products Affected
sato-global
- cl4nx_plus_firmware
- cl4nx_plus
CWE
CWE-863
Incorrect Authorization