Vulnerability Details : CVE-2023-0452
Econolite EOS versions prior to 3.2.23 use a weak hash
algorithm for encrypting privileged user credentials. A configuration file that
is accessible without authentication uses MD5 hashes for encrypting
credentials, including those of administrators and technicians.
Products affected by CVE-2023-0452
- cpe:2.3:a:econolite:eos:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-0452
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-0452
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
ICS-CERT | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2023-0452
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: nvd@nist.gov (Secondary)
-
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).Assigned by: ics-cert@hq.dhs.gov (Primary)
References for CVE-2023-0452
-
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02
Econolite EOS | CISAThird Party Advisory;US Government Resource
Jump to