Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-4816
HistorySep 11, 2023 - 8:15 a.m.

Input validation

2023-09-1108:15:00
PRIOn knowledge base
www.prio-n.com
6
vulnerability
equipment tag out
authentication
single sign-on
password validation
t214
exploited
authenticated user
confirmation dialog box
arbitrary password
holder action

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.3%

A vulnerability exists in the Equipment Tag Out authentication, when configured with Single Sign-On (SSO) with password validation in T214. This vulnerability can be exploited by an authenticated user per-forming an Equipment Tag Out holder action (Accept, Release, and Clear) for another user and entering an arbitrary password in the holder action confirmation dialog box. Despite entering an arbitrary password in the confirmation box, the system will execute the selected holder action.

CPENameOperatorVersion
asset_suiteeq9.6.4
asset_suitele9.6.3.11.1

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.3%

Related for PRION:CVE-2023-4816