PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-3047 TMT CVE debrief

CVE-2023-3047 is a critical SQL injection vulnerability affecting TMT Lockcell firmware before version 15. The issue was published on 2023-06-13 and is rated CVSS 9.8, reflecting a network-reachable flaw with no required privileges or user interaction. Defensive attention should focus on identifying affected Lockcell deployments and upgrading or otherwise removing exposure where firmware remains below the fixed version.

Vendor
TMT
Product
Lockcell
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2023-06-13
Original CVE updated
2024-11-21
Advisory published
2023-06-13
Advisory updated
2024-11-21

Who should care

Organizations that operate TMT Lockcell devices or manage environments where Lockcell firmware may be deployed before version 15 should treat this as high priority. Security and operations teams should pay particular attention to internet-exposed or business-critical systems, since the CVSS vector indicates remote, unauthenticated attack conditions.

Technical summary

NVD classifies the issue as CWE-89 (SQL Injection). The NVD record maps the vulnerable firmware range to Lockcell versions before 15. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates the flaw can be triggered remotely without authentication or user interaction and may allow high-impact compromise of confidentiality, integrity, and availability.

Defensive priority

Critical. Prioritize remediation quickly because the published severity is 9.8 and the exposure is remote, unauthenticated, and high impact.

Recommended defensive actions

  • Inventory all TMT Lockcell deployments and confirm firmware version.
  • Upgrade any affected Lockcell firmware to version 15 or later, or the vendor-fixed version if different in your environment.
  • Restrict network access to Lockcell management interfaces until remediation is complete.
  • Review logs and database/application telemetry for unusual query patterns or unexpected access around exposed Lockcell services.
  • Validate compensating controls, such as segmentation and least-privilege service accounts, to reduce impact if exploitation is attempted.

Evidence notes

This debrief is based on the NVD CVE record and the referenced USOM/third-party advisory links included in the source corpus. The NVD metadata identifies the weakness as CWE-89 and the vulnerable CPE range as TMT Lockcell firmware before 15. The record also includes a third-party advisory reference that is tagged as an exploit-related source, but this summary does not assume exploitability details beyond the supplied metadata.

Official resources

Published by NVD on 2023-06-13 and modified on 2024-11-21. No KEV listing was supplied in the corpus.