The cookie session ID is of insufficient length and can be exploited by
brute force, which may allow a remote attacker to obtain a valid
session, bypass authentication, and manipulate the transmitter.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-47201 The cookie session ID is of insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication, and manipulate the transmitter.
Fixes

Solution

No solution given by the vendor.


Workaround

Sielco has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of Sielco PolyEco FM Transmitter are invited to contact Sielco customer support https://www.sielco.org/en/contacts  for additional information.

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:28:22.775Z

Reserved: 2023-10-25T15:23:55.536Z

Link: CVE-2023-42769

cve-icon Vulnrichment

Updated: 2024-08-02T19:30:24.286Z

cve-icon NVD

Status : Modified

Published: 2023-10-26T17:15:08.950

Modified: 2024-11-21T08:23:07.470

Link: CVE-2023-42769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.