Vulnerability Description
The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result in NTLMv2 hashes being sent to a malicious entity position on the local network. These hashes can subsequently be attacked through brute force and cracked if a weak password is used. This attack would only apply to domain joined systems.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bd | Facschorus | 5.0 |
| Hp | Hp Z2 Tower G9 | - |
| Hp | Hp Z2 Tower G5 | - |
Related Weaknesses (CWE)
References
- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-softwareVendor Advisory
- https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-softwareVendor Advisory
FAQ
What is CVE-2023-29062?
CVE-2023-29062 is a vulnerability with a CVSS score of 3.8 (LOW). The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested reso...
How severe is CVE-2023-29062?
CVE-2023-29062 has been rated LOW with a CVSS base score of 3.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-29062?
Check the references section above for vendor advisories and patch information. Affected products include: Bd Facschorus, Hp Hp Z2 Tower G9, Hp Hp Z2 Tower G5.