CVE-2023-48123
pfSense Plus vulnerability analysis and mitigation

Overview

CVE-2023-48123 affects Netgate pfSense Plus v.23.05.1 and earlier versions, as well as pfSense CE v.2.7.0. The vulnerability allows a remote attacker with authentication to execute arbitrary code via a crafted request to the packetcapture.php file. The issue was discovered by joint researchers (Byeongcheol Choi, Jinyong Lee, PWNLAB@KHU) and was disclosed on October 31, 2023 ([Vendor Advisory](https://docs.netgate.com/downloads/pfSense-SA-2311.webgui.asc)).

Technical details

The vulnerability exists in the packet_capture.php component of the pfSense WebGUI. The issue stems from insufficient validation of the 'count' and 'length' POST parameters when performing a packet capture. These values are directly used in shell commands without proper escaping, allowing for command injection. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) (NVD).

Impact

Due to the lack of proper command escaping, an authenticated attacker can execute arbitrary commands on the system by submitting specially crafted values for the 'count' or 'length' parameters in POST operations. The attacker must have sufficient privileges to access the packetcapture.php page ([Vendor Advisory](https://docs.netgate.com/downloads/pfSense-SA-2311.webgui.asc)).

Mitigation and workarounds

Users can upgrade to pfSense Plus software version 23.09 or later, or pfSense CE software version 2.7.1 or later. For users unable to upgrade immediately, temporary mitigations include limiting access to the affected pages to trusted administrators only and avoiding logging into the firewall with the same browser used for non-administrative web browsing. The fix can also be applied through the System Patches package (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Related pfSense Plus vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-54780HIGH8.8
  • pfSense PluspfSense Plus
  • cpe:2.3:a:netgate:pfsense_plus
NoYesMay 14, 2025
CVE-2023-48123HIGH8.8
  • pfSense PluspfSense Plus
  • cpe:2.3:a:netgate:pfsense_plus
NoYesDec 06, 2023
CVE-2023-48795MEDIUM5.9
  • PythonPython
  • libssh-debuginfo
NoYesDec 18, 2023
CVE-2024-57273MEDIUM5.4
  • pfSense PluspfSense Plus
  • cpe:2.3:a:netgate:pfsense_plus
NoYesMay 14, 2025
CVE-2024-54779MEDIUM5.4
  • pfSense PluspfSense Plus
  • cpe:2.3:a:netgate:pfsense_plus
NoYesMay 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management