Skip to main content

CVE-2023-45162: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in 1E 1E Platform

Critical
VulnerabilityCVE-2023-45162cvecve-2023-45162cwe-89
Published: Fri Oct 13 2023 (10/13/2023, 12:48:01 UTC)
Source: CVE
Vendor/Project: 1E
Product: 1E Platform

Description

Affected 1E Platform versions have a Blind SQL Injection vulnerability that can lead to arbitrary code execution.  Application of the relevant hotfix remediates this issue. for v8.1.2 apply hotfix Q23166 for v8.4.1 apply hotfix Q23164 for v9.0.1 apply hotfix Q23169 SaaS implementations on v23.7.1 will automatically have hotfix Q23173 applied. Customers with SaaS versions below this are urged to upgrade urgently - please contact 1E to arrange this

AI-Powered Analysis

AILast updated: 07/04/2025, 12:56:34 UTC

Technical Analysis

CVE-2023-45162 is a critical security vulnerability classified under CWE-89, indicating an SQL Injection flaw in the 1E Platform software. This vulnerability specifically manifests as a Blind SQL Injection, which allows an attacker to inject malicious SQL queries into the backend database through unsanitized input fields. Exploiting this flaw can lead to arbitrary code execution on the affected system, thereby compromising the confidentiality, integrity, and availability of the platform and its data. The vulnerability affects multiple versions of the 1E Platform, including v8.1.2, v8.4.1, and v9.0.1, with specific hotfixes (Q23166, Q23164, Q23169 respectively) released to remediate the issue. SaaS deployments running version 23.7.1 or later have the hotfix Q23173 automatically applied, but earlier SaaS versions require urgent upgrading. The CVSS 3.1 base score of 9.9 reflects the critical nature of this vulnerability, highlighting its network attack vector (AV:N), low attack complexity (AC:L), requirement for low privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) that impacts confidentiality, integrity, and availability at a high level. The vulnerability enables attackers to execute arbitrary commands on the host system, potentially leading to full system compromise, data exfiltration, or disruption of services. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a high-risk issue that demands immediate attention from organizations using the 1E Platform.

Potential Impact

For European organizations, the impact of CVE-2023-45162 can be severe, especially for those relying on the 1E Platform for endpoint management, software deployment, and IT operations automation. Successful exploitation could allow attackers to gain unauthorized access to sensitive corporate data, manipulate or destroy critical operational data, and disrupt IT service continuity. This could lead to regulatory non-compliance issues under GDPR due to potential data breaches, financial losses from operational downtime, and reputational damage. Given the platform’s role in managing enterprise IT environments, attackers could leverage this vulnerability to pivot within networks, escalating privileges and compromising additional systems. The criticality of this vulnerability is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government institutions prevalent across Europe. Additionally, the lack of required user interaction and the ability to exploit remotely over the network increase the risk of widespread attacks if patches are not applied promptly.

Mitigation Recommendations

European organizations using the 1E Platform should immediately verify their platform version and apply the corresponding hotfixes provided by 1E: Q23166 for v8.1.2, Q23164 for v8.4.1, Q23169 for v9.0.1, or upgrade to SaaS version 23.7.1 or later to ensure the automatic application of Q23173. Beyond patching, organizations should implement strict input validation and sanitization controls to prevent SQL injection attacks. Network-level protections such as web application firewalls (WAFs) configured to detect and block SQL injection patterns can provide an additional security layer. Monitoring and logging database queries and application logs for anomalous activities related to SQL injection attempts should be established to enable early detection. Access controls should be reviewed to ensure that the principle of least privilege is enforced, minimizing the impact of potential exploitation. Regular security audits and penetration testing focused on injection vulnerabilities can help identify residual risks. Finally, organizations should maintain an incident response plan tailored to database and application-layer attacks to respond swiftly if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
1E
Date Reserved
2023-10-04T23:59:54.079Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb18e

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 12:56:34 PM

Last updated: 8/12/2025, 2:50:44 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats