The cookie session ID is of insufficient length and can be exploited by
brute force, which may allow a remote attacker to obtain a valid
session, bypass authentication, and manipulate the transmitter.

Project Subscriptions

Vendors Products
Analog Fm Transmitter Exc1000gt Subscribe
Analog Fm Transmitter Exc1000gt Firmware Subscribe
Analog Fm Transmitter Exc1000gx Subscribe
Analog Fm Transmitter Exc1000gx Firmware Subscribe
Analog Fm Transmitter Exc100gt Subscribe
Analog Fm Transmitter Exc100gt Firmware Subscribe
Analog Fm Transmitter Exc120gt Subscribe
Analog Fm Transmitter Exc120gt Firmware Subscribe
Analog Fm Transmitter Exc120gx Subscribe
Analog Fm Transmitter Exc120gx Firmware Subscribe
Analog Fm Transmitter Exc1600gx Subscribe
Analog Fm Transmitter Exc1600gx Firmware Subscribe
Analog Fm Transmitter Exc2000gx Subscribe
Analog Fm Transmitter Exc2000gx Firmware Subscribe
Analog Fm Transmitter Exc3000gx Subscribe
Analog Fm Transmitter Exc3000gx Firmware Subscribe
Analog Fm Transmitter Exc300gt Subscribe
Analog Fm Transmitter Exc300gt Firmware Subscribe
Analog Fm Transmitter Exc300gx Subscribe
Analog Fm Transmitter Exc300gx Firmware Subscribe
Analog Fm Transmitter Exc30gt Subscribe
Analog Fm Transmitter Exc30gt Firmware Subscribe
Analog Fm Transmitter Exc5000gt Subscribe
Analog Fm Transmitter Exc5000gt Firmware Subscribe
Analog Fm Transmitter Exc5000gx Subscribe
Analog Fm Transmitter Exc5000gx Firmware Subscribe
Radio Link Exc19 Subscribe
Radio Link Exc19 Firmware Subscribe
Radio Link Rtx19 Subscribe
Radio Link Rtx19 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-47201 The cookie session ID is of insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication, and manipulate the transmitter.
Fixes

Solution

No solution given by the vendor.


Workaround

Sielco has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of Sielco PolyEco FM Transmitter are invited to contact Sielco customer support https://www.sielco.org/en/contacts  for additional information.

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:28:22.775Z

Reserved: 2023-10-25T15:23:55.536Z

Link: CVE-2023-42769

cve-icon Vulnrichment

Updated: 2024-08-02T19:30:24.286Z

cve-icon NVD

Status : Modified

Published: 2023-10-26T17:15:08.950

Modified: 2024-11-21T08:23:07.470

Link: CVE-2023-42769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses