Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Equinox
Equinox [osgi |
|
| Vendors & Products |
Equinox
Equinox [osgi |
Tue, 05 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Eclipse Equinox OSGi 3.7.2 and earlier contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending payloads to the console interface. Attackers can connect to the OSGi console port and send base64-encoded bash commands wrapped in fork directives to achieve code execution and establish reverse shell connections. | |
| Title | Eclipse Equinox OSGi 3.7.2 Remote Code Execution via Console | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-05T14:12:54.330Z
Reserved: 2026-01-10T01:51:52.984Z
Link: CVE-2023-54344
Updated: 2026-05-05T14:03:36.237Z
Status : Deferred
Published: 2026-05-05T12:16:16.710
Modified: 2026-05-05T19:47:31.297
Link: CVE-2023-54344
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:21:47Z