When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.paxton-access.com/systems/net2/ |
History
Wed, 27 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: NCSC-NL
Published: 2023-12-19T15:09:13.276Z
Updated: 2024-11-27T20:03:30.624Z
Reserved: 2023-09-25T07:14:20.358Z
Link: CVE-2023-43870
Vulnrichment
Updated: 2024-08-02T19:52:11.914Z
NVD
Status : Modified
Published: 2023-12-19T15:15:08.357
Modified: 2024-11-21T08:24:55.823
Link: CVE-2023-43870
Redhat
No data.