LOW · 3.8

CVE-2023-29062

The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested reso...

Vulnerability Description

The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result in NTLMv2 hashes being sent to a malicious entity position on the local network. These hashes can subsequently be attacked through brute force and cracked if a weak password is used. This attack would only apply to domain joined systems.

CVSS Score

3.8

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
BdFacschorus5.0
HpHp Z2 Tower G9-
HpHp Z2 Tower G5-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-29062?

CVE-2023-29062 is a vulnerability with a CVSS score of 3.8 (LOW). The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested reso...

How severe is CVE-2023-29062?

CVE-2023-29062 has been rated LOW with a CVSS base score of 3.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-29062?

Check the references section above for vendor advisories and patch information. Affected products include: Bd Facschorus, Hp Hp Z2 Tower G9, Hp Hp Z2 Tower G5.