CVE-2023-4667

8.1 HIGH

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in PAC Device web interfaces allows administrators to inject malicious scripts into form fields. When other users access the administration interface, these scripts execute in their browsers, potentially compromising their sessions. All users of the affected PAC Device web administration interface are at risk.

💻 Affected Systems

Products:
  • PAC Device
Versions: Specific versions not provided in CVE description
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to exploit initially, but affects all users of the web administration interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack administrative sessions, install backdoors, exfiltrate sensitive configuration data, or pivot to internal network systems.

🟠

Likely Case

Session hijacking leading to unauthorized administrative access, data leakage of device configurations, and potential privilege escalation within the web interface.

🟢

If Mitigated

Limited to interface disruption or minor data exposure if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires administrator credentials for initial script injection, but subsequent exploitation affects all interface users automatically.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.idemia.com/vulnerability-information

Restart Required: Yes

Instructions:

1. Check vendor advisory for firmware updates. 2. Download latest firmware from vendor portal. 3. Backup current configuration. 4. Apply firmware update via web interface. 5. Verify update completion and restore configuration if needed.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement server-side input validation to sanitize all user inputs in web interface fields

Custom implementation required based on web framework

Output Encoding

all

Apply proper output encoding to all dynamic content rendered in the web interface

Custom implementation required based on templating system

🧯 If You Can't Patch

  • Restrict administrative access to trusted users only and implement strict access controls
  • Implement web application firewall (WAF) rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Test by attempting to inject basic XSS payloads (like <script>alert('test')</script>) into administrator-accessible form fields and checking if they execute when other users view the interface.

Check Version:

Check firmware version in web interface under System > About or similar menu

Verify Fix Applied:

After patching, repeat XSS injection tests to confirm payloads are properly sanitized and do not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in form submissions
  • Multiple failed login attempts followed by successful admin login
  • Administrative actions from unexpected IP addresses

Network Indicators:

  • HTTP requests containing suspicious script tags or JavaScript in POST parameters
  • Unusual outbound connections from the device after administrative access

SIEM Query:

source="pac_device_logs" AND (message="*<script>*" OR message="*javascript:*" OR message="*onload=*" OR message="*onerror=*")

🔗 References

📤 Share & Export