brute force, which may allow a remote attacker to obtain a valid
session, bypass authentication, and manipulate the transmitter.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-47201 | The cookie session ID is of insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication, and manipulate the transmitter. |
Solution
No solution given by the vendor.
Workaround
Sielco has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of Sielco PolyEco FM Transmitter are invited to contact Sielco customer support https://www.sielco.org/en/contacts for additional information.
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:28:22.775Z
Reserved: 2023-10-25T15:23:55.536Z
Link: CVE-2023-42769
Updated: 2024-08-02T19:30:24.286Z
Status : Modified
Published: 2023-10-26T17:15:08.950
Modified: 2024-11-21T08:23:07.470
Link: CVE-2023-42769
No data.
OpenCVE Enrichment
No data.
EUVD