Screen SFT DAB 600/C Firmware 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP-bound session identifiers. Attackers can exploit the vulnerable deviceManagement API endpoint to reset device configurations by sending crafted POST requests with manipulated session parameters.
Metrics
Affected Vendors & Products
References
History
Mon, 22 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Screen SFT DAB 600/C Firmware 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP-bound session identifiers. Attackers can exploit the vulnerable deviceManagement API endpoint to reset device configurations by sending crafted POST requests with manipulated session parameters. | |
| Title | Screen SFT DAB 600/C Firmware 1.9.3 Authentication Bypass Reset Board Config | |
| Weaknesses | CWE-306 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-22T22:04:57.904Z
Reserved: 2025-12-20T16:31:20.898Z
Link: CVE-2023-53970
Updated: 2025-12-22T21:59:06.733Z
Status : Received
Published: 2025-12-22T22:16:01.923
Modified: 2025-12-22T22:16:01.923
Link: CVE-2023-53970
No data.
OpenCVE Enrichment
No data.