Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-43318: n/a

0
High
VulnerabilityCVE-2023-43318cvecve-2023-43318
Published: Tue Mar 05 2024 (03/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:35:43 UTC

Technical Analysis

CVE-2023-43318 is a vulnerability identified in the TP-Link JetStream Smart Switch TL-SG2210P, specifically version 5.0 Build 20211201. The flaw allows an attacker to escalate privileges by modifying the 'tid' and 'usrlvl' parameters in HTTP GET requests sent to the device's management interface. These parameters likely control session or user-level identifiers, and improper validation enables privilege escalation from a lower-privileged user to administrative access. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to enforce correct authorization checks. The CVSS 3.1 score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates that the attack can be performed remotely over the network with low attack complexity, requires some privileges but no user interaction, and can lead to complete compromise of confidentiality, integrity, and availability of the device. The switch is typically used in enterprise and SMB network environments to manage traffic and provide PoE capabilities. Exploitation could allow attackers to gain administrative control, modify configurations, disrupt network traffic, or pivot to other internal systems. No public exploits or patches are currently available, increasing the urgency for defensive measures. The vulnerability was published in March 2024, with the initial reservation in September 2023.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on TP-Link JetStream switches in their network infrastructure. Successful exploitation could lead to unauthorized administrative access, enabling attackers to alter network configurations, intercept or redirect traffic, and disrupt network availability. This could compromise sensitive data confidentiality and integrity, and potentially cause operational downtime. Critical sectors such as finance, healthcare, government, and telecommunications could face severe consequences, including data breaches and service interruptions. The vulnerability's remote network attack vector and lack of required user interaction increase the likelihood of exploitation if the device is accessible. Given the widespread use of TP-Link products in Europe, particularly in SMBs and some enterprise environments, the threat could have broad implications. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly once details are public.

Mitigation Recommendations

1. Immediately restrict network access to the management interface of affected TP-Link JetStream switches, limiting it to trusted administrative networks or VPNs. 2. Implement strict network segmentation to isolate management interfaces from general user networks and the internet. 3. Monitor network traffic for anomalous GET requests containing modified 'tid' and 'usrlvl' parameters, using IDS/IPS solutions or custom detection rules. 4. Enforce strong authentication and authorization policies for device management, including multi-factor authentication if supported. 5. Regularly audit device configurations and logs for signs of unauthorized access or privilege escalation attempts. 6. Engage with TP-Link support channels to obtain information on patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Consider deploying compensating controls such as web application firewalls (WAF) or reverse proxies to filter malicious management requests. 8. Educate network administrators about this vulnerability and the importance of secure device management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-09-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a43a16d939959c8fde0aa

Added to database: 11/4/2025, 6:19:13 PM

Last enriched: 11/4/2025, 6:35:43 PM

Last updated: 12/20/2025, 7:22:01 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats