CVE-2023-43870 Vulnerability Details

  /     /     /  

CVE-2023-43870 Metadata Quick Info

CVE Published: 19/12/2023 | CVE Updated: 27/11/2024 | CVE Year: 2023
Source: NCSC-NL | Vendor: Paxton | Product: Net2
Status : PUBLISHED

CVE-2023-43870 Description

When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.

Metrics

CVSS Version: 3.1 | Base Score: 8.1 HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* NONE
    User Interaction (UI)* REQUIRED
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-798
CWE Name: CWE-798 Use of Hard-coded Credentials
Source: Paxton

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-21
CAPEC Description: CAPEC-21 Exploitation of Trusted Credentials


Source: NVD (National Vulnerability Database).