brute force, which may allow a remote attacker to obtain a valid
session, bypass authentication, and manipulate the transmitter.
No analysis available yet.
Vendor Workaround
Sielco has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of Sielco PolyEco FM Transmitter are invited to contact Sielco customer support https://www.sielco.org/en/contacts for additional information.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-47201 | The cookie session ID is of insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication, and manipulate the transmitter. |
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:28:22.775Z
Reserved: 2023-10-25T15:23:55.536Z
Link: CVE-2023-42769
Updated: 2024-08-02T19:30:24.286Z
Status : Modified
Published: 2023-10-26T17:15:08.950
Modified: 2024-11-21T08:23:07.470
Link: CVE-2023-42769
No data.
OpenCVE Enrichment
No data.
EUVD