CVE-2023-0011

Command Execution through Serial Interface of u-blox TOBY-L2

Description

A flaw in the input validation in TOBY-L2 allows a user to execute arbitrary operating system commands using specifically crafted AT commands. This vulnerability requires physical access to the serial interface of the module or the ability to modify the system or software which uses its serial interface to send malicious AT commands. Exploitation of the vulnerability gives full administrative (root) privileges to the attacker to execute any operating system command on TOBY-L2 which can lead to modification of the behavior of the module itself as well as the components connected with it (depending on its rights on other connected systems). It can further provide the ability to read system level files and hamper the availability of the module as well.. This issue affects TOBY-L2 series: TOBY-L200, TOBY-L201, TOBY-L210, TOBY-L220, TOBY-L280.

Remediation

Solution:

  • Customers should ensures that the TOBY-L2 serial port is available only to internal applications of the device and that the application only allows the use of verified AT commands. For product specific security patches, contact u-blox through customer support portal.

Categories

7.6
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.08%
Vendor Advisory u-blox.com
Affected: u-blox TOBY-L2
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-0011?
CVE-2023-0011 has been scored as a high severity vulnerability.
How to fix CVE-2023-0011?
To fix CVE-2023-0011: Customers should ensures that the TOBY-L2 serial port is available only to internal applications of the device and that the application only allows the use of verified AT commands. For product specific security patches, contact u-blox through customer support portal.
Is CVE-2023-0011 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-0011 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-0011?
CVE-2023-0011 affects u-blox TOBY-L2.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.