Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-3243", "assignerOrgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d", "state": "PUBLISHED", "assignerShortName": "Honeywell", "dateReserved": "2023-06-14T13:51:12.389Z", "datePublished": "2023-06-28T20:23:21.810Z", "dateUpdated": "2024-08-02T06:48:08.512Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "affected", "product": "BCM-WEB", "vendor": "Alerton", "versions": [{"lessThanOrEqual": "3.3.X*", "status": "affected", "version": "3.3.X", "versionType": "semver"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>\n\n** UNSUPPORTED WHEN ASSIGNED ** [An attacker can capture an authenticating hash\nand utilize it to create new sessions. The hash is also a poorly salted MD5\nhash, which could result in a successful brute force password attack. Impacted product is BCM-WEB version 3.3.X. <span style=\"background-color: var(--wht);\">Recommended fix: Upgrade to a supported product such\nas </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbuildings.honeywell.com%2Fcontent%2Fdam%2Fhbtbt%2Fen%2Fdocuments%2Fdownloads%2FACM-Data-Sheet.pdf&data=05%7C01%7CAbigail.Palacios%40Honeywell.com%7C1d6c8efd4d004d4c794708db7420781b%7C96ece5269c7d48b08daf8b93c90a5d18%7C0%7C0%7C638231455033412035%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0eiTwALAM%2BDi2WPUs%2F4dVN8eNxZQStfqxMqCRfTYpBM%3D&reserved=0\">Alerton\nACM</a><span style=\"background-color: var(--wht);\">.</span>] Out of an abundance of caution, this CVE ID is being assigned to \nbetter serve our customers and ensure all who are still running this product understand \nthat the product is end of life and should be removed or upgraded. </p>\n\n\n\n\n\n"}], "value": "\n** UNSUPPORTED WHEN ASSIGNED ** [An attacker can capture an authenticating hash\nand utilize it to create new sessions. The hash is also a poorly salted MD5\nhash, which could result in a successful brute force password attack. Impacted product is BCM-WEB version 3.3.X.\u00a0Recommended fix: Upgrade to a supported product such\nas Alerton\nACM.] Out of an abundance of caution, this CVE ID is being assigned to \nbetter serve our customers and ensure all who are still running this product understand \nthat the product is end of life and should be removed or upgraded.\u00a0\n\n"}], "impacts": [{"capecId": "CAPEC-233", "descriptions": [{"lang": "en", "value": "CAPEC-233 Privilege Escalation"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE"}]}, {"descriptions": [{"cweId": "CWE-326", "description": "CWE-326 Inadequate Encryption Strength", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d", "shortName": "Honeywell", "dateUpdated": "2024-04-25T14:09:27.255Z"}, "references": [{"url": "https://www.honeywell.com/us/en/product-security"}], "source": {"discovery": "UNKNOWN"}, "tags": ["unsupported-when-assigned"], "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2023-3243", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-04-29T19:36:19.657479Z"}}}], "affected": [{"cpes": ["cpe:2.3:o:honeywell:alerton_bcm-web_firmware:-:*:*:*:*:*:*:*"], "vendor": "honeywell", "product": "alerton_bcm-web_firmware", "versions": [{"status": "affected", "version": "-"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:17:36.156Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T06:48:08.512Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.honeywell.com/us/en/product-security", "tags": ["x_transferred"]}]}]}}