PatchSiren cyber security CVE debrief
CVE-2023-35071 MRV Tech CVE debrief
CVE-2023-35071 is a critical SQL injection vulnerability in MRV Tech Logging Administration Panel affecting releases before 20230915. Official records rate it 9.8/CRITICAL with network attack, no privileges required, and no user interaction, indicating a high-risk exposure for internet-facing or broadly reachable deployments.
- Vendor
- MRV Tech
- Product
- Logging Administration Panel
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-09-27
- Original CVE updated
- 2024-11-21
- Advisory published
- 2023-09-27
- Advisory updated
- 2024-11-21
Who should care
Organizations running MRV Tech Logging Administration Panel, especially if the panel is reachable from untrusted networks or used in production logging workflows. Security teams should also care if the product is embedded in a larger appliance or managed service where the underlying version is not obvious.
Technical summary
NVD lists the weakness as CWE-89 (SQL Injection) and identifies the affected CPE range as mrv:logging_administration_panel versions before 20230915. The CVSS v3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) suggests remote exploitation is feasible without authentication or user interaction and could lead to full confidentiality, integrity, and availability impact on the application and its backend data.
Defensive priority
Immediate. Treat as a critical patch-and-verify issue, prioritizing any exposed instances and any systems with access to sensitive logs or connected databases.
Recommended defensive actions
- Identify all deployments of MRV Tech Logging Administration Panel and confirm whether the installed version is earlier than 20230915.
- Upgrade to a vendor-fixed release at or after 20230915 as indicated by the affected-version boundary in NVD.
- Restrict access to the administration panel to trusted networks and administrative users only until remediation is complete.
- Review application and database logs for unusual query errors, unexpected requests, or other signs of misuse around the time the panel was exposed.
- If patching is delayed, apply compensating controls such as network segmentation, VPN-only access, and strong authentication controls around the panel.
Evidence notes
This debrief is based only on the provided official and third-party advisory references. NVD supplies the CVSS vector, CWE-89 classification, and affected version boundary before 20230915. The USOM advisory is the listed third-party reference for the CVE. No exploit details or reproduction guidance are included here.
Official resources
-
CVE-2023-35071 CVE record
CVE.org
-
CVE-2023-35071 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly published on 2023-09-27 and later modified on 2024-11-21 in the official records.