- What is the severity of CVE-2023-36483?
- CVE-2023-36483 has been scored as a medium severity vulnerability.
- How to fix CVE-2023-36483?
- To fix CVE-2023-36483: 1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory. To uninstall, unpublish the services in IIS and remove the service files. All versions (v1.7, 1.8, and 1.9) were discontinued. 2. Remove the MASmobile Classic app from Android and iOS devices. All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore). 3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later). These services do not run under IIS and must be configured in coordination with the customer. 4. Install MASmobile app from Play or AppStore (v2.x.x). This is not an upgrade to MASmobile Classic; it is a different app.
- Is CVE-2023-36483 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2023-36483 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2023-36483?
- CVE-2023-36483 affects MAS (a Carrier brand) MASmobile Classic, MAS (a Carrier brand) MASmobile Classic, MAS (a Carrier brand) MAS ASP.Net Services.