CVE-2023-43870

When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:paxton-access:net2:*:*:*:*:*:*:*:*
cpe:2.3:a:paxton-access:net2:6.07:-:*:*:*:*:*:*

History

28 Dec 2023, 19:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-798
First Time Paxton-access net2
Paxton-access
CPE cpe:2.3:a:paxton-access:net2:*:*:*:*:*:*:*:*
cpe:2.3:a:paxton-access:net2:6.07:-:*:*:*:*:*:*
References () https://www.paxton-access.com/systems/net2/ - () https://www.paxton-access.com/systems/net2/ - Product

19 Dec 2023, 16:17

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-19 15:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-43870

Mitre link : CVE-2023-43870

CVE.ORG link : CVE-2023-43870


JSON object : View

Products Affected

paxton-access

  • net2
CWE
CWE-798

Use of Hard-coded Credentials