// For flags

CVE-2023-29062

Unsecure Identity Verification

Severity Score

3.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result in NTLMv2 hashes being sent to a malicious entity position on the local network. These hashes can subsequently be attacked through brute force and cracked if a weak password is used. This attack would only apply to domain joined systems.

El sistema operativo que aloja la aplicación FACSChorus está configurado para permitir la transmisión de credenciales de usuario con hash tras la acción del usuario sin validar adecuadamente la identidad del recurso solicitado. Esto es posible mediante el uso de LLMNR, MBT-NS o MDNS y dará como resultado el envío de hashes NTLMv2 a una posición de entidad maliciosa en la red local. Posteriormente, estos hashes pueden atacarse mediante fuerza bruta y descifrarse si se utiliza una contraseña débil. Este ataque sólo se aplicaría a sistemas unidos a un dominio.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-03-30 CVE Reserved
  • 2023-11-28 CVE Published
  • 2023-12-05 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
  • CAPEC-194: Fake the Source of Data
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Bd
Search vendor "Bd"
Facschorus
Search vendor "Bd" for product "Facschorus"
5.0
Search vendor "Bd" for product "Facschorus" and version "5.0"
-
Affected
in Hp
Search vendor "Hp"
Hp Z2 Tower G9
Search vendor "Hp" for product "Hp Z2 Tower G9"
--
Safe
Bd
Search vendor "Bd"
Facschorus
Search vendor "Bd" for product "Facschorus"
5.1
Search vendor "Bd" for product "Facschorus" and version "5.1"
-
Affected
in Hp
Search vendor "Hp"
Hp Z2 Tower G9
Search vendor "Hp" for product "Hp Z2 Tower G9"
--
Safe
Bd
Search vendor "Bd"
Facschorus
Search vendor "Bd" for product "Facschorus"
3.0
Search vendor "Bd" for product "Facschorus" and version "3.0"
-
Affected
in Hp
Search vendor "Hp"
Hp Z2 Tower G5
Search vendor "Hp" for product "Hp Z2 Tower G5"
--
Safe
Bd
Search vendor "Bd"
Facschorus
Search vendor "Bd" for product "Facschorus"
3.1
Search vendor "Bd" for product "Facschorus" and version "3.1"
-
Affected
in Hp
Search vendor "Hp"
Hp Z2 Tower G5
Search vendor "Hp" for product "Hp Z2 Tower G5"
--
Safe