Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7077: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Sharp Display Solutions, Ltd. P403, P463, P553, P703, P801, X554UN, X464UN, X554UNS, X464UNV, X474HB, X464UNS, X554UNV, X555UNS, X555UNV, X754HB, X554HB, E705, E805, E905, UN551S, UN551VS, X551UHD, X651UHD, X841UHD, X981UHD, MD551C8

0
Critical
VulnerabilityCVE-2023-7077cvecve-2023-7077cwe-22
Published: Mon Feb 05 2024 (02/05/2024, 06:57:45 UTC)
Source: CVE
Vendor/Project: Sharp Display Solutions, Ltd.
Product: P403, P463, P553, P703, P801, X554UN, X464UN, X554UNS, X464UNV, X474HB, X464UNS, X554UNV, X555UNS, X555UNV, X754HB, X554HB, E705, E805, E905, UN551S, UN551VS, X551UHD, X651UHD, X841UHD, X981UHD, MD551C8

Description

Sharp NEC Displays (P403, P463, P553, P703, P801, X554UN, X464UN, X554UNS, X464UNV, X474HB, X464UNS, X554UNV, X555UNS, X555UNV, X754HB, X554HB, E705, E805, E905, UN551S, UN551VS, X551UHD, X651UHD, X841UHD, X981UHD, MD551C8) allows an attacker execute remote code by sending unintended parameters in http request.

AI-Powered Analysis

AILast updated: 12/08/2025, 08:21:50 UTC

Technical Analysis

CVE-2023-7077 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as path traversal) affecting a broad range of Sharp NEC Display Solutions models, including but not limited to P403, P463, P553, P703, P801, and various X-series and E-series displays. The vulnerability arises from insufficient validation of pathname inputs in the HTTP interface of these devices. An attacker can exploit this flaw by sending specially crafted HTTP requests containing unintended parameters that manipulate the pathname processing logic. This manipulation enables traversal outside the intended directory scope, allowing the attacker to access restricted files or directories on the device. More critically, this can lead to remote code execution (RCE), where the attacker gains the ability to execute arbitrary commands on the affected device without authentication or user interaction. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation over the network without privileges. The affected versions encompass all versions of the listed models, indicating a widespread exposure. Although no public exploits have been reported yet, the nature of the vulnerability and the criticality of the affected devices make it a significant threat. These display devices are often integrated into enterprise environments, digital signage, and critical infrastructure, increasing the potential impact of a successful attack. The lack of available patches at the time of publication necessitates immediate compensating controls to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2023-7077 is substantial. The affected Sharp NEC displays are commonly used in corporate offices, public venues, transportation hubs, and industrial control environments across Europe. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full device compromise. This could result in unauthorized access to sensitive information displayed or stored on the devices, disruption of display services critical for operations or safety, and use of compromised devices as footholds for lateral movement within networks. Given the devices' network connectivity and deployment in visible or strategic locations, attackers might also leverage them for espionage, misinformation, or sabotage. The criticality is heightened in sectors such as finance, government, healthcare, and transportation, where display integrity and availability are vital. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments with limited network segmentation or outdated device management practices. The absence of patches further exacerbates the risk, making timely mitigation essential to protect European organizations from potential operational and reputational damage.

Mitigation Recommendations

In the absence of official patches, European organizations should implement immediate compensating controls to mitigate CVE-2023-7077. First, restrict network access to affected Sharp NEC displays by placing them behind firewalls or network segmentation zones that limit exposure to untrusted networks, especially the internet. Employ strict access control lists (ACLs) to allow only trusted management stations or internal systems to communicate with these devices. Monitor network traffic for unusual HTTP requests targeting the devices, focusing on anomalous parameters or path traversal patterns. Disable any unnecessary HTTP services or interfaces on the devices if possible. Implement intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics tuned to detect path traversal attempts. Maintain an inventory of all affected devices and track vendor communications for patch releases or firmware updates. Where feasible, consider temporary device replacement or removal from critical environments until patches become available. Educate IT and security teams about the vulnerability to ensure rapid response to any suspicious activity. Finally, review and enhance overall device management and network security policies to reduce the attack surface and improve resilience against similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
NEC
Date Reserved
2023-12-22T09:20:27.202Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec330

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 12/8/2025, 8:21:50 AM

Last updated: 1/19/2026, 10:15:09 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats