Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.
References
Link | Resource |
---|---|
https://claroty.com/team82/disclosure-dashboard/cve-2023-33371 | Third Party Advisory |
https://www.controlid.com.br/en/access-control/idsecure/ | Vendor Advisory |
Configurations
History
05 Aug 2023, 03:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Assaabloy control Id Idsecure
Assaabloy |
|
CWE | CWE-798 | |
References | (MISC) https://claroty.com/team82/disclosure-dashboard/cve-2023-33371 - Third Party Advisory | |
References | (MISC) https://www.controlid.com.br/en/access-control/idsecure/ - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:assaabloy:control_id_idsecure:*:*:*:*:*:*:*:* |
03 Aug 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-03 01:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-33371
Mitre link : CVE-2023-33371
CVE.ORG link : CVE-2023-33371
JSON object : View
Products Affected
assaabloy
- control_id_idsecure
CWE
CWE-798
Use of Hard-coded Credentials