A vulnerability has been identified in Siveillance Video 2020 R2 (All versions < V20.2 HotfixRev14), Siveillance Video 2020 R3 (All versions < V20.3 HotfixRev12), Siveillance Video 2021 R1 (All versions < V21.1 HotfixRev12), Siveillance Video 2021 R2 (All versions < V21.2 HotfixRev8), Siveillance Video 2022 R1 (All versions < V22.1 HotfixRev7), Siveillance Video 2022 R2 (All versions < V22.2 HotfixRev5), Siveillance Video 2022 R3 (All versions < V22.3 HotfixRev2), Siveillance Video 2023 R1 (All versions < V23.1 HotfixRev1). The Event Server component of affected applications deserializes data without sufficient validations. This could allow an authenticated remote attacker to execute code on the affected system.
History

Tue, 28 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published: 2023-05-09T11:51:36.439Z

Updated: 2025-01-28T18:34:29.442Z

Reserved: 2023-04-20T12:49:01.865Z

Link: CVE-2023-30898

cve-icon Vulnrichment

Updated: 2024-08-02T14:37:15.529Z

cve-icon NVD

Status : Modified

Published: 2023-05-09T13:15:18.107

Modified: 2024-11-21T08:01:01.660

Link: CVE-2023-30898

cve-icon Redhat

No data.