CVE-2023-36610

?The affected TBox RTUs generate software security tokens using insufficient entropy. The random seed used to generate the software tokens is not initialized correctly, and other parts of the token are generated using predictable time-based values. An attacker with this knowledge could successfully brute force the token and authenticate themselves.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 Mitigation Third Party Advisory US Government Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 Mitigation Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ovarro:tbox_ms-cpu32_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ovarro:tbox_ms-cpu32:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ovarro:tbox_ms-cpu32-s2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ovarro:tbox_ms-cpu32-s2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:ovarro:tbox_lt2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ovarro:tbox_lt2:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:ovarro:tbox_tg2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ovarro:tbox_tg2:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:ovarro:tbox_rm2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ovarro:tbox_rm2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:10

Type Values Removed Values Added
References () https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 - Mitigation, Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 - Mitigation, Third Party Advisory, US Government Resource

Information

Published : 2023-07-03 21:15

Updated : 2024-11-21 08:10


NVD link : CVE-2023-36610

Mitre link : CVE-2023-36610

CVE.ORG link : CVE-2023-36610


JSON object : View

Products Affected

ovarro

  • tbox_ms-cpu32_firmware
  • tbox_ms-cpu32
  • tbox_rm2
  • tbox_tg2_firmware
  • tbox_ms-cpu32-s2_firmware
  • tbox_tg2
  • tbox_rm2_firmware
  • tbox_ms-cpu32-s2
  • tbox_lt2
  • tbox_lt2_firmware
CWE
CWE-331

Insufficient Entropy