First published: Tue Sep 19 2023(Updated: )
Weak password recovery mechanism vulnerability in Fujitsu Arconte Áurea version 1.5.0.0, which exploitation could allow an attacker to perform a brute force attack on the emailed PIN number in order to change the password of a legitimate user.
Credit: cve-coordination@incibe.es cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Fujitsu Arconte Aurea | =1.5.0.0 | |
=1.5.0.0 |
This vulnerabilities have been fixed by Fujitsu in version 1.5.0.0, released on 4/4/2022. All new versions of the product, including the latest 1.6.2.3, also include the fixes.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this weak password recovery mechanism vulnerability is CVE-2023-4096.
The affected software version is Fujitsu Arconte Áurea version 1.5.0.0.
The severity rating of this vulnerability is high, with a CVSS score of 8.6.
An attacker who exploits this vulnerability can perform a brute force attack on the emailed PIN number to change the password of a legitimate user.
It is recommended to update to a patched version of Fujitsu Arconte Áurea to address this vulnerability.