​The affected TBox RTUs generate software security tokens using insufficient entropy. The random seed used to generate the software tokens is not initialized correctly, and other parts of the token are generated using predictable time-based values. An attacker with this knowledge could successfully brute force the token and authenticate themselves.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 Mitigation Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2023-07-03T20:01:31.978Z

Updated: 2023-07-03T20:01:31.978Z

Reserved: 2023-06-23T20:39:08.361Z


Link: CVE-2023-36610

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-07-03T21:15:09.967

Modified: 2023-11-07T04:16:38.887


Link: CVE-2023-36610

JSON object: View

cve-icon Redhat Information

No data.

CWE