Description
Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-37534 | Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication. |
References
History
Thu, 17 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-17T16:46:34.211Z
Reserved: 2023-05-22T00:00:00.000Z
Link: CVE-2023-33371
Updated: 2024-08-02T15:47:05.171Z
Status : Modified
Published: 2023-08-03T01:15:11.260
Modified: 2024-11-21T08:05:29.757
Link: CVE-2023-33371
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD