The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, invalid values will be included, potentially truncating the string if a NUL is encountered. If the simplified password is not detected by the administrator, the device might be left in a vulnerable state as a result of more-easily compromised credentials. Note that passwords entered via the Crimson system web server do not suffer from this vulnerability.
References
Link | Resource |
---|---|
https://support.redlion.net/hc/en-us/categories/360002087671-Security-Advisories | Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-01 | Third Party Advisory US Government Resource |
https://support.redlion.net/hc/en-us/categories/360002087671-Security-Advisories | Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-06 20:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5719
Mitre link : CVE-2023-5719
CVE.ORG link : CVE-2023-5719
JSON object : View
Products Affected
redlion
- da70a
- da50a
- crimson
CWE