CVE-2023-49716

Emerson Rosemount GC370XA, GC700XA, GC1500XA Command Injection

Description

In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an authenticated user with network access could run arbitrary commands from a remote computer.

Remediation

Solution:

  • Emerson recommends end users update the affected products' firmware. For update information, contact Emerson Security https://www.emerson.com/en-us/support/security-notifications  web page.

Category

6.9
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.10%
Vendor Advisory emerson.com
Affected: Emerson Rosemount GC370XA
Affected: Emerson Rosemount GC700XA
Affected: Emerson Rosemount GC1500XA
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-49716?
CVE-2023-49716 has been scored as a medium severity vulnerability.
How to fix CVE-2023-49716?
To fix CVE-2023-49716: Emerson recommends end users update the affected products' firmware. For update information, contact Emerson Security https://www.emerson.com/en-us/support/security-notifications  web page.
Is CVE-2023-49716 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-49716 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-49716?
CVE-2023-49716 affects Emerson Rosemount GC370XA, Emerson Rosemount GC700XA, Emerson Rosemount GC1500XA.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.