The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, invalid values will be included, potentially truncating the string if a NUL is encountered. If the simplified password is not detected by the administrator, the device might be left in a vulnerable state as a result of more-easily compromised credentials. Note that passwords entered via the Crimson system web server do not suffer from this vulnerability.
References
Link | Resource |
---|---|
https://support.redlion.net/hc/en-us/categories/360002087671-Security-Advisories | Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-01 | Third Party Advisory US Government Resource |
https://support.redlion.net/hc/en-us/categories/360002087671-Security-Advisories | Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://support.redlion.net/hc/en-us/categories/360002087671-Security-Advisories - Vendor Advisory | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-01 - Third Party Advisory, US Government Resource |
14 Nov 2023, 19:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:redlion:crimson:3.2:build_3.2.0016.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0025.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0026.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0015.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0041.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0036.0:*:*:*:*:*:* cpe:2.3:h:redlion:da70a:-:*:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0008.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0030.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0053.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0044.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0021.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0014.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0050.0:*:*:*:*:*:* cpe:2.3:h:redlion:da50a:-:*:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0053.1:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0053.18:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0020.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0040.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:*:*:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0035.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0051.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0047.0:*:*:*:*:*:* cpe:2.3:a:redlion:crimson:3.2:build_3.2.0031.0:*:*:*:*:*:* |
|
References | (MISC) https://support.redlion.net/hc/en-us/categories/360002087671-Security-Advisories - Vendor Advisory | |
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-01 - Third Party Advisory, US Government Resource | |
First Time |
Redlion
Redlion crimson Redlion da70a Redlion da50a |
|
CWE | NVD-CWE-Other |
06 Nov 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-06 20:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5719
Mitre link : CVE-2023-5719
CVE.ORG link : CVE-2023-5719
JSON object : View
Products Affected
redlion
- da70a
- crimson
- da50a
CWE