PatchSiren cyber security CVE debrief
CVE-2023-1863 Eskom CVE debrief
CVE-2023-1863 is a critical SQL injection vulnerability in Eskom Water Metering Software affecting versions before 23.04.06. The issue is rated 9.8 (CVSS v3.1) and is described as allowing command line execution through SQL injection. Because the weakness is exposed through network-accessible attack paths and does not require privileges or user interaction, it should be treated as an urgent remediation item.
- Vendor
- Eskom
- Product
- El Terminali (su Okuma) Uygulamalarimiz
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-04-14
- Original CVE updated
- 2024-11-21
- Advisory published
- 2023-04-14
- Advisory updated
- 2024-11-21
Who should care
Operators and administrators responsible for Eskom Water Metering Software, security teams monitoring externally reachable application services, and incident responders who need to assess whether any affected installations are exposed or already compromised.
Technical summary
NVD classifies the flaw as CWE-89 (SQL Injection) and lists the vulnerable CPE as Eskom El Terminali (su Okuma) Uygulamalarimiz, with affected versions ending before 23.04.06. The CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a remotely reachable issue with high potential impact. The description states that improper neutralization of SQL command special characters can lead to command line execution.
Defensive priority
Immediate. This is a critical, remotely reachable injection flaw with severe confidentiality, integrity, and availability impact, so affected systems should be prioritized for rapid patching or compensating controls.
Recommended defensive actions
- Upgrade Eskom Water Metering Software to version 23.04.06 or later.
- Identify all deployed instances and confirm whether any are running a version earlier than 23.04.06.
- Restrict network access to the application until remediation is complete, especially from untrusted networks.
- Review application and system logs for signs of unexpected SQL activity or abnormal command execution.
- Validate that input handling and query construction are using safe, parameterized patterns in the affected code path.
- Monitor the vendor/third-party advisory reference for any additional mitigation guidance or updates.
Evidence notes
All key details are drawn from the supplied NVD record and the referenced USOM advisory link: CVE publication date 2023-04-14, last modified 2024-11-21, CVSS 9.8, CWE-89, vulnerable versions before 23.04.06, and the description that the flaw can allow command line execution through SQL injection. The source metadata also includes a third-party advisory reference at usom.gov.tr/bildirim/tr-23-0225.
Official resources
-
CVE-2023-1863 CVE record
CVE.org
-
CVE-2023-1863 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed on 2023-04-14; NVD last modified the record on 2024-11-21. Do not use the report-generation date as the vulnerability date.