CVE-2023-51572

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary system commands on Voltronic Power ViewPower Pro installations. Attackers can exploit a command injection flaw in the getMacAddressByIP function to gain SYSTEM-level code execution. Organizations using affected versions of this power management software are at risk.

💻 Affected Systems

Products:
  • Voltronic Power ViewPower Pro
Versions: Specific vulnerable versions not publicly detailed in references; all unpatched versions are likely affected
Operating Systems: Windows-based systems running ViewPower Pro
Default Config Vulnerable: ⚠️ Yes
Notes: Authentication is not required to exploit this vulnerability, making default installations highly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install malware, exfiltrate data, pivot to other systems, or disrupt power management operations.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data theft, or creation of persistent backdoors on affected systems.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have network controls preventing external access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending crafted network requests to the affected service. No authentication is needed, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-1878/

Restart Required: Yes

Instructions:

1. Contact Voltronic Power for the latest patched version. 2. Download and install the update. 3. Restart the ViewPower Pro service or system. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ViewPower Pro systems from untrusted networks and restrict access to authorized IPs only.

Use firewall rules to block external access to ViewPower Pro ports
Implement network segmentation/VLANs

Service Hardening

windows

Run ViewPower Pro with least privilege and implement application controls.

Run service under non-administrator account
Implement application whitelisting

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor for unusual network traffic or system behavior

🔍 How to Verify

Check if Vulnerable:

Check if ViewPower Pro is running and accessible on the network. Review version against vendor advisories.

Check Version:

Check ViewPower Pro application interface or installation directory for version information

Verify Fix Applied:

Verify the installed version matches the patched version from Voltronic Power and test that command injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution events in system logs
  • Failed authentication attempts if logging enabled
  • Unexpected process creation

Network Indicators:

  • Unusual network traffic to ViewPower Pro ports
  • Suspicious payloads in network packets
  • Connection attempts from unexpected sources

SIEM Query:

source="ViewPower Pro" AND (event="command_execution" OR event="system_call")

🔗 References

📤 Share & Export