Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53740: CWE-862: Missing Authorization in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter

0
High
VulnerabilityCVE-2023-53740cvecve-2023-53740cwe-862
Published: Wed Dec 10 2025 (12/10/2025, 21:06:29 UTC)
Source: CVE Database V5
Vendor/Project: DB Elettronica Telecomunicazioni SpA
Product: Screen SFT DAB Series - Compact Radio DAB Transmitter

Description

Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without providing the current credentials. Attackers can exploit the userManager.cgx endpoint by sending a crafted JSON request with a new MD5-hashed password to directly modify the admin account.

AI-Powered Analysis

AILast updated: 12/10/2025, 21:11:17 UTC

Technical Analysis

CVE-2023-53740 is an authentication bypass vulnerability classified under CWE-862 affecting version 1.9.3 of the Screen SFT DAB Series, a compact radio DAB transmitter manufactured by DB Elettronica Telecomunicazioni SpA. The vulnerability arises due to missing authorization checks on the userManager.cgx endpoint, which handles administrative user management functions. An attacker can send a specially crafted JSON request containing a new MD5-hashed password to this endpoint without providing the current admin credentials or any form of authentication. This allows the attacker to overwrite the administrator password and gain full administrative access to the device. The vulnerability is remotely exploitable over the network (attack vector: adjacent network), requires low attack complexity, and does not require privileges or prior authentication. User interaction is needed only to send the crafted request. The impact on confidentiality and integrity is high since an attacker can fully control the device, potentially altering configurations or disrupting broadcast transmissions. Availability impact is low but could be elevated if the attacker intentionally disrupts services. The vulnerability does not require scope changes or chaining with other vulnerabilities. No patches or exploits are currently publicly available, but the high CVSS score (8.6) reflects the critical nature of the flaw. The device’s role in digital audio broadcasting infrastructure makes this vulnerability particularly sensitive, as unauthorized control could impact broadcast reliability and security.

Potential Impact

For European organizations, particularly broadcasters and telecom operators using the Screen SFT DAB Series transmitters, this vulnerability poses a significant risk. Exploitation could lead to unauthorized administrative access, allowing attackers to alter device configurations, disrupt digital audio broadcasting services, or potentially use the compromised device as a foothold for further network intrusion. This could result in service outages, reputational damage, and regulatory non-compliance, especially under EU directives on critical infrastructure protection and data security. The impact extends beyond individual devices to potentially affect entire broadcast networks if multiple transmitters are compromised. Given the critical role of digital radio in public communication and emergency broadcasting, the vulnerability could also have societal implications. The lack of authentication requirement lowers the barrier for exploitation, increasing the urgency for mitigation in environments where these devices are accessible over internal or adjacent networks.

Mitigation Recommendations

1. Immediately restrict network access to the management interface of the Screen SFT DAB transmitters, ideally isolating them on dedicated management VLANs or physically separate networks. 2. Implement strict firewall rules to limit access to the userManager.cgx endpoint only to authorized administrative hosts. 3. Monitor network traffic for unusual JSON requests targeting the userManager.cgx endpoint to detect potential exploitation attempts. 4. Enforce strong network segmentation between broadcast infrastructure and general enterprise networks to reduce exposure. 5. Engage with DB Elettronica Telecomunicazioni SpA for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 6. Where possible, disable remote management features or require VPN access with multi-factor authentication for administrative access. 7. Conduct regular audits of device configurations and administrative accounts to detect unauthorized changes. 8. Develop incident response plans specific to broadcast infrastructure compromise scenarios to minimize downtime and impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-07T13:16:38.432Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939e1d75ab76fdc5f210952

Added to database: 12/10/2025, 9:10:47 PM

Last enriched: 12/10/2025, 9:11:17 PM

Last updated: 12/11/2025, 3:47:08 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats