This security advisory addresses a vulnerability identified in ethernet switches.
CVE-2023-38408
Because of an unreliable search path, the PKCS#11 feature in OpenSSH’s ssh-agent before 9.3p2 allows remote code execution if an agent is sent to a system controlled by an attacker. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: This issue exists because of an incomplete fix for CVE-2016-10009. (Source: cve.org)
CVE-2023-38408 is related to the SSH agent component and can only be exploited when SSH agent forwarding is enabled. However, in typical deployment scenarios, Moxa's ethernet switches operate as SSH servers and does not enable `ssh-agent` or agent forwarding functionality. Therefore, the practical risk is considered very low because the conditions required to trigger this vulnerability are not present by default. This issue is considered low risk, users may evaluate their environments and decide if updating is required.
The Identified Vulnerability Type and Potential Impact
| CVE ID |
Vulnerability Type |
Impact |
| CVE-2023-38408 |
CWE-428: Unquoted Search Path or Element
|
Remote code execution if an agent is forwarded to an attacker-controlled system. |
Vulnerability Scoring Details
|
CVE ID
|
Base Score
|
Vector
|
Severity |
Unauthenticated
Remote Exploits
|
| CVE-2023-38408 |
CVSS 3.1: 9.8
|
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Critical |
Yes |