PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-35071 MRV Tech CVE debrief

CVE-2023-35071 is a critical SQL injection vulnerability in MRV Tech Logging Administration Panel affecting releases before 20230915. Official records rate it 9.8/CRITICAL with network attack, no privileges required, and no user interaction, indicating a high-risk exposure for internet-facing or broadly reachable deployments.

Vendor
MRV Tech
Product
Logging Administration Panel
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2023-09-27
Original CVE updated
2024-11-21
Advisory published
2023-09-27
Advisory updated
2024-11-21

Who should care

Organizations running MRV Tech Logging Administration Panel, especially if the panel is reachable from untrusted networks or used in production logging workflows. Security teams should also care if the product is embedded in a larger appliance or managed service where the underlying version is not obvious.

Technical summary

NVD lists the weakness as CWE-89 (SQL Injection) and identifies the affected CPE range as mrv:logging_administration_panel versions before 20230915. The CVSS v3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) suggests remote exploitation is feasible without authentication or user interaction and could lead to full confidentiality, integrity, and availability impact on the application and its backend data.

Defensive priority

Immediate. Treat as a critical patch-and-verify issue, prioritizing any exposed instances and any systems with access to sensitive logs or connected databases.

Recommended defensive actions

  • Identify all deployments of MRV Tech Logging Administration Panel and confirm whether the installed version is earlier than 20230915.
  • Upgrade to a vendor-fixed release at or after 20230915 as indicated by the affected-version boundary in NVD.
  • Restrict access to the administration panel to trusted networks and administrative users only until remediation is complete.
  • Review application and database logs for unusual query errors, unexpected requests, or other signs of misuse around the time the panel was exposed.
  • If patching is delayed, apply compensating controls such as network segmentation, VPN-only access, and strong authentication controls around the panel.

Evidence notes

This debrief is based only on the provided official and third-party advisory references. NVD supplies the CVSS vector, CWE-89 classification, and affected version boundary before 20230915. The USOM advisory is the listed third-party reference for the CVE. No exploit details or reproduction guidance are included here.

Official resources

Publicly published on 2023-09-27 and later modified on 2024-11-21 in the official records.