9.8
CVE-2023-43870
- EPSS 0.07%
- Veröffentlicht 19.12.2023 15:15:08
- Zuletzt bearbeitet 21.11.2024 08:24:55
- Quelle cert@ncsc.nl
- CVE-Watchlists
- Unerledigt
When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Paxton-access ≫ Net2 Version >= 6.02 < 6.07
Paxton-access ≫ Net2 Version6.07 Update-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.211 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| cert@ncsc.nl | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.