FKIE_CVE-2023-43870

Vulnerability from fkie_nvd - Published: 2023-12-19 15:15 - Updated: 2024-11-21 08:24
Summary
When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.
Impacted products
Vendor Product Version
paxton-access net2 *
paxton-access net2 6.07

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:paxton-access:net2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C3F8BF-B86F-4685-80E6-D8EA28AA427F",
              "versionEndExcluding": "6.07",
              "versionStartIncluding": "6.02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:paxton-access:net2:6.07:-:*:*:*:*:*:*",
              "matchCriteriaId": "8E4CB52A-DABA-45E3-A770-4AD00B069CD2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content."
    },
    {
      "lang": "es",
      "value": "Al instalar el software Net2, se instala un certificado root en el almac\u00e9n de confianza. Un hacker potencial podr\u00eda acceder al archivo por lotes del instalador o aplicar ingenier\u00eda inversa al c\u00f3digo fuente para obtener acceso a la contrase\u00f1a del certificado root. Usando el certificado root y la contrase\u00f1a, podr\u00edan crear sus propios certificados para emular otro sitio. Luego, al establecer un servicio proxy para emular el sitio, podr\u00edan monitorizar el tr\u00e1fico que pasa entre el usuario final y el sitio, permitiendo el acceso al contenido de los datos."
    }
  ],
  "id": "CVE-2023-43870",
  "lastModified": "2024-11-21T08:24:55.823",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "cert@ncsc.nl",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-12-19T15:15:08.357",
  "references": [
    {
      "source": "cert@ncsc.nl",
      "tags": [
        "Product"
      ],
      "url": "https://www.paxton-access.com/systems/net2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.paxton-access.com/systems/net2/"
    }
  ],
  "sourceIdentifier": "cert@ncsc.nl",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "cert@ncsc.nl",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…