When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.
References
Link | Resource |
---|---|
https://www.paxton-access.com/systems/net2/ | Product |
Configurations
Configuration 1 (hide)
|
History
28 Dec 2023, 19:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-798 | |
First Time |
Paxton-access net2
Paxton-access |
|
CPE | cpe:2.3:a:paxton-access:net2:*:*:*:*:*:*:*:* cpe:2.3:a:paxton-access:net2:6.07:-:*:*:*:*:*:* |
|
References | () https://www.paxton-access.com/systems/net2/ - Product |
19 Dec 2023, 16:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-19 15:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-43870
Mitre link : CVE-2023-43870
CVE.ORG link : CVE-2023-43870
JSON object : View
Products Affected
paxton-access
- net2
CWE
CWE-798
Use of Hard-coded Credentials