Skip to main content

CVE-2023-43743: n/a in n/a

High
VulnerabilityCVE-2023-43743cvecve-2023-43743
Published: Fri Dec 08 2023 (12/08/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

A SQL injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an authenticated attacker to execute arbitrary SQL queries on the backend database via the filter parameter in requests to the /newapi/ endpoint in the Zultys MX web interface.

AI-Powered Analysis

AILast updated: 07/06/2025, 03:26:19 UTC

Technical Analysis

CVE-2023-43743 is a high-severity SQL injection vulnerability affecting multiple models of Zultys MX communication systems, including MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30. These devices run firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109. The vulnerability exists in the web interface's /newapi/ endpoint, specifically in the handling of the 'filter' parameter. An authenticated attacker with at least limited privileges can inject arbitrary SQL commands into backend database queries by manipulating this parameter. This flaw stems from improper sanitization or validation of user-supplied input, classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Exploiting this vulnerability does not require user interaction beyond authentication, and the attack can lead to full compromise of the database's confidentiality, integrity, and availability. The CVSS v3.1 score of 8.8 reflects the ease of network-based exploitation (AV:N), low attack complexity (AC:L), requirement for privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations using affected Zultys MX products, which are often deployed in enterprise telephony and unified communications environments. Successful exploitation could allow attackers to extract sensitive data, modify or delete records, disrupt communications, or pivot to further network compromise.

Potential Impact

For European organizations, the impact of CVE-2023-43743 is substantial due to the critical role Zultys MX systems play in enterprise communications infrastructure. Compromise of these systems could lead to exposure of sensitive corporate communications, customer data, and internal operational information, violating GDPR and other data protection regulations. The integrity and availability of telephony services could be disrupted, affecting business continuity and potentially causing financial and reputational damage. Given the high confidentiality and integrity impact, attackers might leverage this vulnerability for espionage, data theft, or sabotage. The requirement for authentication limits exposure to internal or credentialed threat actors, but insider threats or compromised credentials could facilitate exploitation. The absence of known active exploits provides a window for proactive mitigation, but the high CVSS score indicates that once exploited, the consequences are severe.

Mitigation Recommendations

European organizations using affected Zultys MX products should immediately verify their firmware versions and upgrade to at least version 17.0.10 patch 17161 or 16.04 patch 16109 or later, where the vulnerability is patched. If immediate patching is not feasible, organizations should restrict access to the /newapi/ endpoint by implementing network segmentation and firewall rules limiting access to trusted administrative hosts. Enforce strong authentication mechanisms and monitor authentication logs for suspicious activity. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'filter' parameter. Conduct regular security audits and penetration tests focusing on the telephony infrastructure. Additionally, implement strict credential management policies to reduce the risk of credential compromise. Finally, maintain up-to-date backups of telephony system configurations and data to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-09-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835dda5182aa0cae2186683

Added to database: 5/27/2025, 3:43:33 PM

Last enriched: 7/6/2025, 3:26:19 AM

Last updated: 7/31/2025, 12:52:49 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats