Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.
References
| Link | Resource |
|---|---|
| https://claroty.com/team82/disclosure-dashboard/cve-2023-33371 | Third Party Advisory |
| https://www.controlid.com.br/en/access-control/idsecure/ | Vendor Advisory |
| https://claroty.com/team82/disclosure-dashboard/cve-2023-33371 | Third Party Advisory |
| https://www.controlid.com.br/en/access-control/idsecure/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://claroty.com/team82/disclosure-dashboard/cve-2023-33371 - Third Party Advisory | |
| References | () https://www.controlid.com.br/en/access-control/idsecure/ - Vendor Advisory |
05 Aug 2023, 03:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://claroty.com/team82/disclosure-dashboard/cve-2023-33371 - Third Party Advisory | |
| References | (MISC) https://www.controlid.com.br/en/access-control/idsecure/ - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-798 | |
| CPE | cpe:2.3:a:assaabloy:control_id_idsecure:*:*:*:*:*:*:*:* |
03 Aug 2023, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-08-03 01:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33371
Mitre link : CVE-2023-33371
CVE.ORG link : CVE-2023-33371
JSON object : View
Products Affected
assaabloy
- control_id_idsecure
CWE
CWE-798
Use of Hard-coded Credentials
