PatchSiren cyber security CVE debrief
CVE-2023-3047 TMT CVE debrief
CVE-2023-3047 is a critical SQL injection vulnerability affecting TMT Lockcell firmware before version 15. The issue was published on 2023-06-13 and is rated CVSS 9.8, reflecting a network-reachable flaw with no required privileges or user interaction. Defensive attention should focus on identifying affected Lockcell deployments and upgrading or otherwise removing exposure where firmware remains below the fixed version.
- Vendor
- TMT
- Product
- Lockcell
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-06-13
- Original CVE updated
- 2024-11-21
- Advisory published
- 2023-06-13
- Advisory updated
- 2024-11-21
Who should care
Organizations that operate TMT Lockcell devices or manage environments where Lockcell firmware may be deployed before version 15 should treat this as high priority. Security and operations teams should pay particular attention to internet-exposed or business-critical systems, since the CVSS vector indicates remote, unauthenticated attack conditions.
Technical summary
NVD classifies the issue as CWE-89 (SQL Injection). The NVD record maps the vulnerable firmware range to Lockcell versions before 15. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates the flaw can be triggered remotely without authentication or user interaction and may allow high-impact compromise of confidentiality, integrity, and availability.
Defensive priority
Critical. Prioritize remediation quickly because the published severity is 9.8 and the exposure is remote, unauthenticated, and high impact.
Recommended defensive actions
- Inventory all TMT Lockcell deployments and confirm firmware version.
- Upgrade any affected Lockcell firmware to version 15 or later, or the vendor-fixed version if different in your environment.
- Restrict network access to Lockcell management interfaces until remediation is complete.
- Review logs and database/application telemetry for unusual query patterns or unexpected access around exposed Lockcell services.
- Validate compensating controls, such as segmentation and least-privilege service accounts, to reduce impact if exploitation is attempted.
Evidence notes
This debrief is based on the NVD CVE record and the referenced USOM/third-party advisory links included in the source corpus. The NVD metadata identifies the weakness as CWE-89 and the vulnerable CPE range as TMT Lockcell firmware before 15. The record also includes a third-party advisory reference that is tagged as an exploit-related source, but this summary does not assume exploitability details beyond the supplied metadata.
Official resources
-
CVE-2023-3047 CVE record
CVE.org
-
CVE-2023-3047 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Published by NVD on 2023-06-13 and modified on 2024-11-21. No KEV listing was supplied in the corpus.