CVE-2023-33831 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in FUXA affects v. 1.1.13.

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 month 2 days

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

FUXA is an open-source supervisory control and data acquisition (SCADA) system that is widely used in various industries such as manufacturing, energy, and water treatment. It allows users to monitor and control their industrial processes through a web-based user interface. The system is designed to provide real-time data acquisition, historical data storage, alarming, and reporting capabilities to automate and optimize industrial processes.

However, the FUXA SCADA system is vulnerable to a critical remote command execution (RCE) vulnerability with a CVE code of CVE-2023-33831. This vulnerability allows attackers to execute arbitrary commands on a vulnerable system by sending a specially crafted HTTP POST request to the /api/runscript endpoint. This endpoint is intended to allow users to execute custom scripts on a remote host, but the vulnerability allows attackers to execute arbitrary code without any authentication or authorization.

The exploitation of this vulnerability can lead to serious consequences for industrial processes controlled by the affected SCADA system. Attackers can remotely control industrial equipment, manipulate process values, and cause physical damage to the machinery. This can result in production downtime, equipment damage, product quality issues, and even safety risks to employees.

In conclusion, it is crucial to stay informed of the latest vulnerabilities, such as the CVE-2023-33831 in the FUXA SCADA system to protect your digital assets from possible attacks. By leveraging pro features on s4e.io, you can easily and quickly learn about vulnerabilities in your digital assets. Stay safe, stay secure!

 

REFERENCES

Get started to protecting your Free Full Security Scan