Vulnerability Details : CVE-2023-6259
Insufficiently Protected Credentials, : Improper Access Control vulnerability in Brivo ACS100, ACS300 allows Password Recovery Exploitation, Bypassing Physical Security.This issue affects ACS100, ACS300: from 5.2.4 before 6.2.4.3.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-6259
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-6259
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6259
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
0.5
|
6.0
|
Security Risk Advisors | 2024-02-21 |
7.6
|
HIGH | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
0.9
|
6.0
|
Security Risk Advisors | 2024-02-19 |
CWE ids for CVE-2023-6259
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: 57dba5dd-1a03-47f6-8b36-e84e47d335d8 (Secondary)
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by: 57dba5dd-1a03-47f6-8b36-e84e47d335d8 (Secondary)
References for CVE-2023-6259
-
https://support.brivo.com/l/en/article/g82txdwepa-brivo-firmware-release-notes#brivo_firmware_release_6_2_4_3
Brivo Access Firmware Release Notes - Brivo Help & Support
-
https://sra.io/advisories/
Security Risk Advisors - Advisories
Jump to