Vulnerability Details CVE-2023-49694
A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 26.6%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2023-49694
-
cpe:2.3:a:netgear:prosafe_network_management_system:-
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.5.0.11
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.5.0.14
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.5.0.16
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.5.0.18
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.5.0.19
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.5.0.2
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.6.0.11
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.6.0.18
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.6.0.21
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.6.0.24
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.6.0.26
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.6.0.27
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.6.0.3
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.1
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.12
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.20
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.22
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.26
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.4
-
cpe:2.3:a:netgear:prosafe_network_management_system:1.7.0.8