vendor:
Screen SFT DAB 600/C
by:
LiquidWorm
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Screen SFT DAB 600/C
Affected Version From: Firmware: 1.9.3, Bios firmware: 7.1 (Apr 19 2021), Gui: 2.46, FPGA: 169.55, uc: 6.15
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Keil-EWEB/2.1, MontaVista® Linux® Carrier Grade eXpress (CGX)
2023
Screen SFT DAB 600/C – Authentication Bypass Account Creation
The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.
Mitigation:
Implement strong session management controls to prevent IP address manipulation and unauthorized access.