Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53740: CWE-862: Missing Authorization in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter

0
High
VulnerabilityCVE-2023-53740cvecve-2023-53740cwe-862
Published: Wed Dec 10 2025 (12/10/2025, 21:06:29 UTC)
Source: CVE Database V5
Vendor/Project: DB Elettronica Telecomunicazioni SpA
Product: Screen SFT DAB Series - Compact Radio DAB Transmitter

Description

Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without providing the current credentials. Attackers can exploit the userManager.cgx endpoint by sending a crafted JSON request with a new MD5-hashed password to directly modify the admin account.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:04:57 UTC

Technical Analysis

CVE-2023-53740 is an authentication bypass vulnerability classified under CWE-862 affecting the Screen SFT DAB 1.9.3 software used in DB Elettronica Telecomunicazioni SpA's Compact Radio DAB Transmitter series. The vulnerability arises because the userManager.cgx endpoint improperly authorizes requests, allowing attackers to bypass authentication controls. By sending a specially crafted JSON request containing a new administrator password hashed with MD5, an attacker can overwrite the existing admin password without providing the current credentials. This flaw effectively grants unauthorized administrative access to the device, enabling full control over its configuration and operation. The vulnerability has a CVSS 4.0 base score of 8.6, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:P). The impact metrics show high confidentiality and integrity impact, with low availability impact. The vulnerability does not require physical access or authentication, making it exploitable remotely within the network segment. While no public exploits are reported yet, the straightforward exploitation method and critical access gained pose a significant risk to affected systems. The Screen SFT DAB series is used in digital audio broadcasting infrastructure, making this vulnerability particularly relevant to broadcast operators and telecom providers. The lack of available patches at the time of publication necessitates immediate compensating controls to mitigate risk.

Potential Impact

For European organizations, especially broadcasters and telecom operators relying on DB Elettronica's Screen SFT DAB transmitters, this vulnerability poses a serious risk. Unauthorized administrative access can lead to manipulation or disruption of digital audio broadcast services, impacting service availability and integrity. Attackers could alter broadcast content, disable transmitters, or use compromised devices as pivot points for further network intrusion. Confidentiality of administrative credentials and device configurations is also at risk, potentially exposing sensitive operational data. Given the critical role of DAB transmitters in public communication infrastructure, exploitation could affect large audiences and critical information dissemination. The impact extends to regulatory compliance, as service disruptions or unauthorized control may violate EU telecom and data protection regulations. The vulnerability's ease of exploitation within local or adjacent networks increases risk in environments with insufficient network segmentation or access controls. Organizations may face reputational damage and operational losses if attacks occur during critical broadcast periods.

Mitigation Recommendations

1. Immediately restrict network access to the Screen SFT DAB devices by implementing strict firewall rules and network segmentation to limit access to trusted management hosts only. 2. Monitor network traffic for unusual or unauthorized requests to the userManager.cgx endpoint, focusing on JSON payloads attempting password changes. 3. Enforce strong physical and logical access controls to prevent unauthorized local or network access to the devices. 4. Disable or restrict remote management interfaces if not required, or enforce VPN and multi-factor authentication for remote access. 5. Regularly audit device configurations and administrator accounts for unauthorized changes. 6. Engage with DB Elettronica Telecomunicazioni SpA for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 8. Conduct security awareness training for operational staff to recognize and report suspicious activities related to broadcast infrastructure. 9. Develop and test incident response plans specific to broadcast equipment compromise scenarios. 10. Consider deploying network anomaly detection solutions to identify deviations in device behavior that may indicate compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-07T13:16:38.432Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939e1d75ab76fdc5f210952

Added to database: 12/10/2025, 9:10:47 PM

Last enriched: 12/17/2025, 11:04:57 PM

Last updated: 2/7/2026, 4:36:10 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats