CVE-2023-51595
📋 TL;DR
This is an unauthenticated SQL injection vulnerability in Voltronic Power ViewPower Pro that allows remote attackers to execute arbitrary code. Attackers can exploit this without credentials to run code with LOCAL SERVICE privileges. All installations of affected ViewPower Pro versions are vulnerable.
💻 Affected Systems
- Voltronic Power ViewPower Pro
📦 What is this software?
Viewpower by Voltronicpower
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote code execution as LOCAL SERVICE, potentially leading to lateral movement, data theft, or ransomware deployment.
Likely Case
Remote code execution leading to system compromise, data exfiltration, or installation of backdoors/malware.
If Mitigated
Attack blocked at network perimeter; no impact if system is properly isolated and patched.
🎯 Exploit Status
SQL injection to RCE chain is well-documented; unauthenticated access makes exploitation straightforward for attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in references
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-1897/
Restart Required: Yes
Instructions:
1. Contact Voltronic Power for patch information 2. Apply latest security updates 3. Restart affected services 4. Verify patch application
🔧 Temporary Workarounds
Network Segmentation
allIsolate ViewPower Pro systems from untrusted networks
Firewall Rules
allRestrict access to ViewPower Pro ports to authorized IPs only
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access
- Deploy web application firewall (WAF) with SQL injection protection rules
🔍 How to Verify
Check if Vulnerable:
Check if running Voltronic Power ViewPower Pro; test for SQL injection in selectDeviceListBy endpoint
Check Version:
Check application version through admin interface or vendor documentation
Verify Fix Applied:
Verify patch version from vendor; test that SQL injection attempts no longer succeed
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in application logs
- Multiple failed authentication attempts to selectDeviceListBy endpoint
- Unexpected process execution as LOCAL SERVICE
Network Indicators:
- SQL injection patterns in HTTP requests to ViewPower Pro
- Unusual outbound connections from ViewPower Pro system
SIEM Query:
source="viewpower" AND ("selectDeviceListBy" OR sql_injection_patterns)