/

CVE-2023-47246 Report - Details, Severity, & Advisorie...

CVE-2023-47246 Report - Details, Severity, & Advisories

Twingate Team

Jun 6, 2024

What is CVE-2023-47246?

CVE-2023-47246 is a critical vulnerability affecting SysAid On-Premise software versions up to 23.3.36. This severe path traversal vulnerability can lead to unauthorized code execution, allowing attackers to gain control over affected systems. The vulnerability has been exploited in the wild, targeting systems running SysAid On-Premise software. It is crucial for organizations to update their software to the latest version to mitigate the risk associated with this vulnerability.

Who is impacted by this?

All versions of the software up to, but not including, 23.3.36 are impacted by this issue. In simple terms, this vulnerability allows attackers to exploit a weakness in the software, potentially gaining unauthorized access and control over the affected system. It is essential for users to be aware of this vulnerability and take necessary precautions to protect their systems.

What should I do if I’m affected?

If you're affected by the CVE-2023-47246 vulnerability, it's crucial to take immediate action to secure your system. First, upgrade to the latest version of SysAid On-Premise software. Before upgrading, back up your SysAid Server folder and database. Ensure your server is updated with the latest OS versions and security patches, and restrict access to the SysAid Server to your local network or VPN. Additionally, consider installing security controls like Endpoint Detection and Response (EDR) and a Web Application Firewall (WAF) on your SysAid server.

  • Upgrade to the latest version of SysAid On-Premise software

  • Back up your SysAid Server folder and database

  • Update your server with the latest OS versions and security patches

  • Restrict access to the SysAid Server to your local network or VPN

  • Install security controls like EDR and WAF on your SysAid server

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2023-47246 vulnerability, also known as SysAid Server Path Traversal Vulnerability, is indeed listed in CISA's Known Exploited Vulnerabilities Catalog. It was added on November 13, 2023, with a due date of December 4, 2023. The required action is to apply mitigations as per vendor instructions or discontinue the product's use if mitigations are unavailable.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-22, which is a path traversal issue in SysAid On-Premise software.

Learn More

For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or refer to the sources below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2023-47246 Report - Details, Severity, & Advisorie...

CVE-2023-47246 Report - Details, Severity, & Advisories

Twingate Team

Jun 6, 2024

What is CVE-2023-47246?

CVE-2023-47246 is a critical vulnerability affecting SysAid On-Premise software versions up to 23.3.36. This severe path traversal vulnerability can lead to unauthorized code execution, allowing attackers to gain control over affected systems. The vulnerability has been exploited in the wild, targeting systems running SysAid On-Premise software. It is crucial for organizations to update their software to the latest version to mitigate the risk associated with this vulnerability.

Who is impacted by this?

All versions of the software up to, but not including, 23.3.36 are impacted by this issue. In simple terms, this vulnerability allows attackers to exploit a weakness in the software, potentially gaining unauthorized access and control over the affected system. It is essential for users to be aware of this vulnerability and take necessary precautions to protect their systems.

What should I do if I’m affected?

If you're affected by the CVE-2023-47246 vulnerability, it's crucial to take immediate action to secure your system. First, upgrade to the latest version of SysAid On-Premise software. Before upgrading, back up your SysAid Server folder and database. Ensure your server is updated with the latest OS versions and security patches, and restrict access to the SysAid Server to your local network or VPN. Additionally, consider installing security controls like Endpoint Detection and Response (EDR) and a Web Application Firewall (WAF) on your SysAid server.

  • Upgrade to the latest version of SysAid On-Premise software

  • Back up your SysAid Server folder and database

  • Update your server with the latest OS versions and security patches

  • Restrict access to the SysAid Server to your local network or VPN

  • Install security controls like EDR and WAF on your SysAid server

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2023-47246 vulnerability, also known as SysAid Server Path Traversal Vulnerability, is indeed listed in CISA's Known Exploited Vulnerabilities Catalog. It was added on November 13, 2023, with a due date of December 4, 2023. The required action is to apply mitigations as per vendor instructions or discontinue the product's use if mitigations are unavailable.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-22, which is a path traversal issue in SysAid On-Premise software.

Learn More

For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or refer to the sources below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2023-47246 Report - Details, Severity, & Advisories

Twingate Team

Jun 6, 2024

What is CVE-2023-47246?

CVE-2023-47246 is a critical vulnerability affecting SysAid On-Premise software versions up to 23.3.36. This severe path traversal vulnerability can lead to unauthorized code execution, allowing attackers to gain control over affected systems. The vulnerability has been exploited in the wild, targeting systems running SysAid On-Premise software. It is crucial for organizations to update their software to the latest version to mitigate the risk associated with this vulnerability.

Who is impacted by this?

All versions of the software up to, but not including, 23.3.36 are impacted by this issue. In simple terms, this vulnerability allows attackers to exploit a weakness in the software, potentially gaining unauthorized access and control over the affected system. It is essential for users to be aware of this vulnerability and take necessary precautions to protect their systems.

What should I do if I’m affected?

If you're affected by the CVE-2023-47246 vulnerability, it's crucial to take immediate action to secure your system. First, upgrade to the latest version of SysAid On-Premise software. Before upgrading, back up your SysAid Server folder and database. Ensure your server is updated with the latest OS versions and security patches, and restrict access to the SysAid Server to your local network or VPN. Additionally, consider installing security controls like Endpoint Detection and Response (EDR) and a Web Application Firewall (WAF) on your SysAid server.

  • Upgrade to the latest version of SysAid On-Premise software

  • Back up your SysAid Server folder and database

  • Update your server with the latest OS versions and security patches

  • Restrict access to the SysAid Server to your local network or VPN

  • Install security controls like EDR and WAF on your SysAid server

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2023-47246 vulnerability, also known as SysAid Server Path Traversal Vulnerability, is indeed listed in CISA's Known Exploited Vulnerabilities Catalog. It was added on November 13, 2023, with a due date of December 4, 2023. The required action is to apply mitigations as per vendor instructions or discontinue the product's use if mitigations are unavailable.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-22, which is a path traversal issue in SysAid On-Premise software.

Learn More

For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or refer to the sources below.