First published: Tue Nov 28 2023(Updated: )
The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result in NTLMv2 hashes being sent to a malicious entity position on the local network. These hashes can subsequently be attacked through brute force and cracked if a weak password is used. This attack would only apply to domain joined systems.
Credit: cybersecurity@bd.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Bd Facschorus | =5.0 | |
Bd Facschorus | =5.1 | |
Hp Hp Z2 Tower G9 | ||
All of | ||
Any of | ||
Bd Facschorus | =3.0 | |
Bd Facschorus | =3.1 | |
Hp Hp Z2 Tower G5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Unsecure Identity Verification is CVE-2023-29062.
The severity of CVE-2023-29062 is low with a severity value of 3.8.
FACSChorus versions 5.0 and 5.1 are affected by CVE-2023-29062.
To fix the Unsecure Identity Verification vulnerability, it is recommended to apply the necessary patches or updates provided by the software vendor.
More information about CVE-2023-29062 can be found at the following URL: [https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software](https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software)