Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without providing the current credentials. Attackers can exploit the userManager.cgx endpoint by sending a crafted JSON request with a new MD5-hashed password to directly modify the admin account.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.9.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.9.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.9.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.9.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.9.3"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53740.json"