CVE-2023-28725
CVSS V2 None
CVSS V3 None
Description
General Bytes Crypto Application Server (CAS) 20230120, as distributed with General Bytes BATM devices, allows remote attackers to execute arbitrary Java code by uploading a Java application to the /batm/app/admin/standalone/deployments directory, aka BATM-4780, as exploited in the wild in March 2023. This is fixed in 20221118.48 and 20230120.44.
Overview
- CVE ID
- CVE-2023-28725
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-22T00:15:12
- Last Modified Date
- 2023-03-27T22:19:47
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:generalbytes:crypto_application_server:20230120:*:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://arstechnica.com/information-technology/2023/03/hackers-drain-bitcoin-atms-of-1-5-million-by-exploiting-0-day-bug/ | Press/Media Coverage |
https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023 | Exploit Vendor Advisory |
https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS | Mitigation |
https://twitter.com/generalbytes/status/1637192687160897537 | Issue Tracking |
https://web3isgoinggreat.com/single/general-bytes-crypto-atms-exploited-for-over-1-6-million | Third Party Advisory |
https://www.bleepingcomputer.com/news/security/general-bytes-bitcoin-atms-hacked-using-zero-day-15m-stolen/ | Press/Media Coverage |
https://www.generalbytes.com/en/support/changelog | Release Notes |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28725 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28725 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:05:13 | Added to TrackCVE | |||
2023-04-17 03:05:16 | Weakness Enumeration | new |