Lucene search

K
cve[email protected]CVE-2023-3243
HistoryJun 28, 2023 - 9:15 p.m.

CVE-2023-3243

2023-06-2821:15:10
CWE-326
CWE-290
web.nvd.nist.gov
28
security
vulnerability
hash capture
authentication
brute force attack
bcm-web
cve-2023-3243

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.6%

UNSUPPORTED WHEN ASSIGNED [An attacker can capture an authenticating hash
and utilize it to create new sessions. The hash is also a poorly salted MD5
hash, which could result in a successful brute force password attack. Impacted product is BCM-WEB version 3.3.X.Β Recommended fix: Upgrade to a supported product such
as Alerton
ACM.] Out of an abundance of caution, this CVE ID is being assigned to
better serve our customers and ensure all who are still running this product understand
that the product is end of life and should be removed or upgraded.

Affected configurations

NVD
Node
honeywellalerton_bcm-webMatch-
AND
honeywellalerton_bcm-web_firmwareMatch-

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "BCM-WEB",
    "vendor": "Alerton",
    "versions": [
      {
        "lessThanOrEqual": "3.3.X*",
        "status": "affected",
        "version": "3.3.X",
        "versionType": "semver"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.6%

Related for CVE-2023-3243