We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-43870



AssignerNCSC-NL
Reserved2023-09-25
Published2023-12-19
Updated2024-08-02

Description

When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.



HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Product status

Default status
unaffected

6.02 before 6.07 SR1
affected

Credits

Jeroen Hermans, CloudAware, j.hermans@cloudaware[.]eu finder

References

https://www.paxton-access.com/systems/net2/ (Paxton Net2 Product Page) product

cve.org CVE-2023-43870

nvd.nist.gov CVE-2023-43870

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-43870
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.