The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result in NTLMv2 hashes being sent to a malicious entity position on the local network. These hashes can subsequently be attacked through brute force and cracked if a weak password is used. This attack would only apply to domain joined systems.
References
Link | Resource |
---|---|
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: BD
Published: 2023-11-28T20:34:22.945Z
Updated: 2023-11-28T20:34:22.945Z
Reserved: 2023-03-30T21:10:17.526Z
Link: CVE-2023-29062
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-28T21:15:07.440
Modified: 2023-12-05T14:44:47.873
Link: CVE-2023-29062
JSON object: View
Redhat Information
No data.
CWE