Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-47246: n/a

0
Critical
VulnerabilityCVE-2023-47246cvecve-2023-47246
Published: Fri Nov 10 2023 (11/10/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:04:55 UTC

Technical Analysis

CVE-2023-47246 is a critical security vulnerability identified in SysAid On-Premise versions before 23.3.36. The flaw is a path traversal vulnerability (CWE-22) that allows an attacker to write arbitrary files into the Tomcat webroot directory. By exploiting this, an attacker can place malicious code that the Tomcat server will execute, resulting in remote code execution (RCE) without requiring any authentication or user interaction. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), making it highly dangerous. The vulnerability was publicly disclosed and exploited in the wild as of November 2023, indicating active threat actors leveraging this flaw. The impact includes full compromise of the affected system, allowing attackers to execute arbitrary commands, steal sensitive data, disrupt services, or move laterally within the network. SysAid is widely used for IT service management, so exploitation could disrupt critical IT operations. The lack of available patches at the time of disclosure increases the urgency for mitigation. The vulnerability affects the Tomcat web server component embedded in SysAid, which is a common target due to its widespread use in enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2023-47246 is significant. Organizations relying on SysAid On-Premise for IT service management could face complete system compromise, leading to data breaches, operational disruption, and potential ransomware deployment. Confidentiality is at high risk as attackers can execute arbitrary code and access sensitive information. Integrity and availability are also severely impacted since attackers can modify or delete data and disrupt IT service management functions. Critical sectors such as finance, healthcare, government, and telecommunications that depend on SysAid for incident and asset management are particularly vulnerable. The ease of exploitation and lack of required authentication mean attackers can rapidly compromise exposed systems, potentially leading to widespread impact across interconnected networks. Additionally, the exploitation could serve as a foothold for further attacks targeting European infrastructure or intellectual property. The reputational damage and regulatory consequences under GDPR for data breaches could also be severe.

Mitigation Recommendations

1. Immediately upgrade SysAid On-Premise to version 23.3.36 or later once available to apply the official patch addressing CVE-2023-47246. 2. Until a patch is applied, restrict network access to the SysAid management interface and Tomcat webroot by implementing strict firewall rules and network segmentation to limit exposure to trusted administrators only. 3. Monitor web server logs and file system changes for any unauthorized file writes or suspicious activity within the Tomcat webroot directory. 4. Employ application-layer firewalls or web application firewalls (WAFs) with rules designed to detect and block path traversal attempts targeting SysAid. 5. Conduct regular vulnerability scans and penetration tests focusing on SysAid deployments to identify potential exploitation attempts. 6. Implement strict access controls and multi-factor authentication for administrative access to SysAid to reduce risk of lateral movement post-exploitation. 7. Prepare incident response plans specifically addressing potential compromise via this vulnerability, including forensic readiness and containment strategies. 8. Engage with SysAid support and security advisories to stay informed about updates and mitigation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9ae247d717aace26787

Added to database: 10/21/2025, 7:06:22 PM

Last enriched: 10/21/2025, 8:04:55 PM

Last updated: 10/30/2025, 3:15:20 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats