CVE-2023-53775
BaseFortify
Publication date: 2025-12-10
Last updated on: 2025-12-11
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| screen | sft_dab | 1.9.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-384 | Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an authentication bypass in Screen SFT DAB 1.9.3 that allows attackers to change user passwords without proper authentication. It occurs because of weak session management controls, where attackers can reuse IP-bound session identifiers to send unauthorized requests to the userManager API and modify user credentials.
How can this vulnerability impact me? :
The vulnerability can allow attackers to change user passwords without authorization, potentially leading to unauthorized access to user accounts, loss of account control, and further compromise of the system or sensitive data.