CVE Vulnerabilities

CVE-2023-30898

Deserialization of Untrusted Data

Published: May 09, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability has been identified in Siveillance Video 2020 R2 (All versions < V20.2 HotfixRev14), Siveillance Video 2020 R3 (All versions < V20.3 HotfixRev12), Siveillance Video 2021 R1 (All versions < V21.1 HotfixRev12), Siveillance Video 2021 R2 (All versions < V21.2 HotfixRev8), Siveillance Video 2022 R1 (All versions < V22.1 HotfixRev7), Siveillance Video 2022 R2 (All versions < V22.2 HotfixRev5), Siveillance Video 2022 R3 (All versions < V22.3 HotfixRev2), Siveillance Video 2023 R1 (All versions < V23.1 HotfixRev1). The Event Server component of affected applications deserializes data without sufficient validations. This could allow an authenticated remote attacker to execute code on the affected system.

Weakness

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

Affected Software

Name Vendor Start Version End Version
Siveillance_video Siemens 2020-r2 (including) 2020-r2 (including)
Siveillance_video Siemens 2020-r3 (including) 2020-r3 (including)
Siveillance_video Siemens 2021-r1 (including) 2021-r1 (including)
Siveillance_video Siemens 2021-r2 (including) 2021-r2 (including)
Siveillance_video Siemens 2022-r1 (including) 2022-r1 (including)
Siveillance_video Siemens 2022-r2 (including) 2022-r2 (including)
Siveillance_video Siemens 2022-r3 (including) 2022-r3 (including)
Siveillance_video Siemens 2023-r1 (including) 2023-r1 (including)

Potential Mitigations

  • Make fields transient to protect them from deserialization.
  • An attempt to serialize and then deserialize a class containing transient fields will result in NULLs where the transient data should be. This is an excellent way to prevent time, environment-based, or sensitive variables from being carried over and used improperly.

References