First published: Wed Jun 28 2023(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** [An attacker can capture an authenticating hash and utilize it to create new sessions. The hash is also a poorly salted MD5 hash, which could result in a successful brute force password attack. Impacted product is BCM-WEB version 3.3.X. Recommended fix: Upgrade to a supported product such as Alerton ACM.] Out of an abundance of caution, this CVE ID is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded.
Credit: psirt@honeywell.com psirt@honeywell.com
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Alerton Bcm-web Firmware | ||
Honeywell Alerton Bcm-web | ||
All of | ||
Honeywell Alerton Bcm-web Firmware | ||
Honeywell Alerton Bcm-web |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3243 is a vulnerability that allows an attacker to capture an authenticating hash and utilize it to create new sessions, potentially leading to unauthorized access.
CVE-2023-3243 is considered a critical vulnerability with a severity rating of 9.8 out of 10.
The impacted product is Honeywell Alerton BCM-WEB Firmware version 3.3.
The vulnerability is the usage of a poorly salted MD5 hash for authenticating, which could lead to a successful brute force password attack.
To fix the CVE-2023-3243 vulnerability, it is recommended to update to a patched version of Honeywell Alerton BCM-WEB Firmware.