SB2023082806 - Multiple vulnerabilities in OPTO 22 SNAP PAC S1



SB2023082806 - Multiple vulnerabilities in OPTO 22 SNAP PAC S1

Published: August 28, 2023

Security Bulletin ID SB2023082806
Severity
Medium
Patch available
NO
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Improper Restriction of Excessive Authentication Attempts (CVE-ID: CVE-2023-40706)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the number of login attempts is not limited. A remote attacker can perform a brute-force attack on the built-in web server login.


2) Weak password requirements (CVE-ID: CVE-2023-40707)

The vulnerability allows an attacker to perform brute-force attack and guess the password.

The vulnerability exists due to weak password requirements. An attacker can perform a brute-force attack and guess users' passwords.


3) Improper access control (CVE-ID: CVE-2023-40708)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the File Transfer Protocol (FTP) port. A remote attacker can bypass implemented security restrictions and access some device files.


4) Resource exhaustion (CVE-ID: CVE-2023-40709)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can send a specially crafted ICMP request, trigger resource exhaustion and perform a denial of service (DoS) attack.


5) Resource exhaustion (CVE-ID: CVE-2023-40710)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can send a specially crafted HTTP GET request, trigger resource exhaustion and perform a denial of service (DoS) attack.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.