Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-24496: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Milesight MilesightVPN

0
Medium
VulnerabilityCVE-2023-24496cvecve-2023-24496cwe-80
Published: Thu Jul 06 2023 (07/06/2023, 14:53:31 UTC)
Source: CVE Database V5
Vendor/Project: Milesight
Product: MilesightVPN

Description

Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploited through the name field of the database.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:18:47 UTC

Technical Analysis

CVE-2023-24496 is a cross-site scripting (XSS) vulnerability classified under CWE-80, affecting MilesightVPN version 2.0.2. The vulnerability exists in the detail_device functionality within the requestHandlers.js file, where the application fails to properly neutralize script-related HTML tags in user-controllable input, specifically the 'name' field stored in the database. This improper sanitization allows an attacker to craft a malicious HTTP request that injects arbitrary JavaScript code, which executes in the context of the victim's browser when they access the affected functionality. The vulnerability has a CVSS 3.1 base score of 4.7, indicating medium severity, with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity partially (C:L, I:L), but not availability (A:N). No known exploits have been reported in the wild, but the vulnerability could be leveraged for session hijacking, credential theft, or further attacks if combined with social engineering. The vulnerability is particularly relevant for organizations using MilesightVPN 2.0.2, which is a VPN solution often deployed in enterprise and industrial environments. Since the injection point is the 'name' field in the database, attackers may need to influence or control this data to exploit the vulnerability effectively. The vulnerability's exploitation requires the victim to interact with the malicious payload, typically by visiting a crafted URL or interface. The vulnerability disclosure date is July 6, 2023, and no official patches or updates are linked yet, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data accessed via MilesightVPN 2.0.2. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of authenticated users, potentially leading to session hijacking, credential theft, or unauthorized actions within the VPN interface. This could compromise sensitive internal resources accessed through the VPN, especially in sectors like critical infrastructure, manufacturing, and enterprise IT environments where MilesightVPN is deployed. Although availability is not directly impacted, the breach of confidentiality and integrity could lead to broader security incidents, including lateral movement or data exfiltration. The requirement for user interaction and high attack complexity somewhat limits the exploitability, but targeted phishing or social engineering campaigns could increase risk. European organizations with remote workforces or third-party access via MilesightVPN are particularly vulnerable. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. Failure to address this vulnerability could lead to regulatory compliance issues under GDPR if personal data confidentiality is compromised.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement several specific mitigations: 1) Apply strict input validation and sanitization on all user-controllable fields, especially the 'name' field in the database, to neutralize script-related HTML tags before storage or rendering. 2) Implement robust output encoding/escaping on all data rendered in the web interface to prevent script execution. 3) Restrict access to the vulnerable detail_device functionality to trusted users only, using network segmentation and access control lists to limit exposure. 4) Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 5) Educate users about phishing and social engineering risks to reduce the likelihood of interaction with malicious payloads. 6) Monitor logs and network traffic for suspicious HTTP requests targeting the vulnerable endpoint. 7) Engage with the vendor for updates or patches and plan timely upgrades once available. 8) Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block malicious payloads targeting this vulnerability. These measures combined can reduce the risk until a vendor patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-01-24T19:20:44.636Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53132a90255b94da5758

Added to database: 11/4/2025, 7:25:07 PM

Last enriched: 11/4/2025, 9:18:47 PM

Last updated: 11/6/2025, 12:10:36 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats