PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-1863 Eskom CVE debrief

CVE-2023-1863 is a critical SQL injection vulnerability in Eskom Water Metering Software affecting versions before 23.04.06. The issue is rated 9.8 (CVSS v3.1) and is described as allowing command line execution through SQL injection. Because the weakness is exposed through network-accessible attack paths and does not require privileges or user interaction, it should be treated as an urgent remediation item.

Vendor
Eskom
Product
El Terminali (su Okuma) Uygulamalarimiz
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2023-04-14
Original CVE updated
2024-11-21
Advisory published
2023-04-14
Advisory updated
2024-11-21

Who should care

Operators and administrators responsible for Eskom Water Metering Software, security teams monitoring externally reachable application services, and incident responders who need to assess whether any affected installations are exposed or already compromised.

Technical summary

NVD classifies the flaw as CWE-89 (SQL Injection) and lists the vulnerable CPE as Eskom El Terminali (su Okuma) Uygulamalarimiz, with affected versions ending before 23.04.06. The CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a remotely reachable issue with high potential impact. The description states that improper neutralization of SQL command special characters can lead to command line execution.

Defensive priority

Immediate. This is a critical, remotely reachable injection flaw with severe confidentiality, integrity, and availability impact, so affected systems should be prioritized for rapid patching or compensating controls.

Recommended defensive actions

  • Upgrade Eskom Water Metering Software to version 23.04.06 or later.
  • Identify all deployed instances and confirm whether any are running a version earlier than 23.04.06.
  • Restrict network access to the application until remediation is complete, especially from untrusted networks.
  • Review application and system logs for signs of unexpected SQL activity or abnormal command execution.
  • Validate that input handling and query construction are using safe, parameterized patterns in the affected code path.
  • Monitor the vendor/third-party advisory reference for any additional mitigation guidance or updates.

Evidence notes

All key details are drawn from the supplied NVD record and the referenced USOM advisory link: CVE publication date 2023-04-14, last modified 2024-11-21, CVSS 9.8, CWE-89, vulnerable versions before 23.04.06, and the description that the flaw can allow command line execution through SQL injection. The source metadata also includes a third-party advisory reference at usom.gov.tr/bildirim/tr-23-0225.

Official resources

Publicly disclosed on 2023-04-14; NVD last modified the record on 2024-11-21. Do not use the report-generation date as the vulnerability date.