5.9
CVE-2023-36610
- EPSS 0.12%
- Veröffentlicht 03.07.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:10:04
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
The affected TBox RTUs generate software security tokens using insufficient entropy. The random seed used to generate the software tokens is not initialized correctly, and other parts of the token are generated using predictable time-based values. An attacker with this knowledge could successfully brute force the token and authenticate themselves.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ovarro ≫ Tbox Ms-cpu32 Firmware Version <= 1.50.598
Ovarro ≫ Tbox Ms-cpu32-s2 Firmware Version <= 1.50.598
Ovarro ≫ Tbox Lt2 Firmware Version <= 1.50.598
Ovarro ≫ Tbox Tg2 Firmware Version <= 1.50.598
Ovarro ≫ Tbox Rm2 Firmware Version <= 1.50.598
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.12% | 0.318 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| ics-cert@hq.dhs.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-331 Insufficient Entropy
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.