First published: Tue Nov 28 2023(Updated: )
The FACSChorus software contains sensitive information stored in plaintext. A threat actor could gain hardcoded secrets used by the application, which include tokens and passwords for administrative accounts.
Credit: cybersecurity@bd.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Bd Facschorus | =5.0 | |
Bd Facschorus | =5.1 | |
Hp Hp Z2 Tower G9 | ||
All of | ||
Any of | ||
Bd Facschorus | =3.0 | |
Bd Facschorus | =3.1 | |
Hp Hp Z2 Tower G5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29064 is a vulnerability in the FACSChorus software where sensitive information is stored in plaintext, allowing a threat actor to gain access to hardcoded secrets, such as tokens and passwords for administrative accounts.
CVE-2023-29064 affects Bd Facschorus software versions 5.0 and 5.1.
No, Hp Hp Z2 Tower G9 is not affected by CVE-2023-29064.
CVE-2023-29064 has a severity rating of 4.1 (Medium).
To fix the CVE-2023-29064 vulnerability, update to a patched version of the Bd Facschorus software.