CVE-2023-33371

Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:assaabloy:control_id_idsecure:*:*:*:*:*:*:*:*

History

05 Aug 2023, 03:47

Type Values Removed Values Added
References (MISC) https://claroty.com/team82/disclosure-dashboard/cve-2023-33371 - (MISC) https://claroty.com/team82/disclosure-dashboard/cve-2023-33371 - Third Party Advisory
References (MISC) https://www.controlid.com.br/en/access-control/idsecure/ - (MISC) https://www.controlid.com.br/en/access-control/idsecure/ - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-798
CPE cpe:2.3:a:assaabloy:control_id_idsecure:*:*:*:*:*:*:*:*

03 Aug 2023, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-03 01:15

Updated : 2024-02-05 00:01


NVD link : CVE-2023-33371

Mitre link : CVE-2023-33371

CVE.ORG link : CVE-2023-33371


JSON object : View

Products Affected

assaabloy

  • control_id_idsecure
CWE
CWE-798

Use of Hard-coded Credentials