Authentication Bypass by Primary Weakness in Emerson ROC800 Series RTU and DL8000 Preset Controller



Published: 2023-07-26
Risk High
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2023-1935
CWE-ID CWE-305
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ROC809
Hardware solutions / Routers & switches, VoIP, GSM, etc

ROC827
Hardware solutions / Routers & switches, VoIP, GSM, etc

ROC809L
Hardware solutions / Routers & switches, VoIP, GSM, etc

ROC827L
Hardware solutions / Routers & switches, VoIP, GSM, etc

DL8000
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Emerson

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Authentication Bypass by Primary Weakness

EUVDB-ID: #VU78689

Risk: High

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2023-1935

CWE-ID: CWE-305 - Authentication Bypass by Primary Weakness

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an authentication bypass by primary weakness. A remote attacker can gain unauthorized access to data or control of the device and perform a denial of service attack.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

ROC809: All versions

ROC827: All versions

ROC809L: All versions

ROC827L: All versions

DL8000: All versions

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-206-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###