Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.CONTROL_ID_IDSECURE_CVE-2023-33371.NBIN
HistorySep 29, 2023 - 12:00 a.m.

Control iD iDSecure Hard-coded JWT Key Authentication Bypass (CVE-2023-33371)

2023-09-2900:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
7
control id idsecure jwt key authentication bypass binary scanner cve-2023-33371

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.3%

The Control iD iDSecure running on the remote host uses a hard-coded JWT key. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to bypass authentication to perform otherwise restricted operations.

Binary data control_id_idsecure_cve-2023-33371.nbin
VendorProductVersionCPE
assaabloycontrol_id_idsecurecpe:/a:assaabloy:control_id_idsecure

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.3%

Related for CONTROL_ID_IDSECURE_CVE-2023-33371.NBIN