← Back to CVEs
CVE-2023-6329
CRITICAL9.8
Description
An authentication bypass vulnerability exists in Control iD iDSecure v4.7.32.0. The login routine used by iDS-Core.dll contains a "passwordCustom" option that allows an unauthenticated attacker to compute valid credentials that can be used to bypass authentication and act as an administrative user.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published11/27/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
controlid:idsecure
Weaknesses (CWE)
CWE-287CWE-287
References
https://tenable.com/security/research/tra-2023-36(vulnreport@tenable.com)
https://tenable.com/security/research/tra-2023-36(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.