CVE-2023-53740: CWE-862: Missing Authorization in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without providing the current credentials. Attackers can exploit the userManager.cgx endpoint by sending a crafted JSON request with a new MD5-hashed password to directly modify the admin account.
AI Analysis
Technical Summary
CVE-2023-53740 is an authentication bypass vulnerability classified under CWE-862 affecting version 1.9.3 of the Screen SFT DAB Series, a compact radio DAB transmitter manufactured by DB Elettronica Telecomunicazioni SpA. The vulnerability arises due to missing authorization checks on the userManager.cgx endpoint, which handles administrative user management functions. An attacker can send a specially crafted JSON request containing a new MD5-hashed password to this endpoint without providing the current admin credentials or any form of authentication. This allows the attacker to overwrite the administrator password and gain full administrative access to the device. The vulnerability is remotely exploitable over the network (attack vector: adjacent network), requires low attack complexity, and does not require privileges or prior authentication. User interaction is needed only to send the crafted request. The impact on confidentiality and integrity is high since an attacker can fully control the device, potentially altering configurations or disrupting broadcast transmissions. Availability impact is low but could be elevated if the attacker intentionally disrupts services. The vulnerability does not require scope changes or chaining with other vulnerabilities. No patches or exploits are currently publicly available, but the high CVSS score (8.6) reflects the critical nature of the flaw. The device’s role in digital audio broadcasting infrastructure makes this vulnerability particularly sensitive, as unauthorized control could impact broadcast reliability and security.
Potential Impact
For European organizations, particularly broadcasters and telecom operators using the Screen SFT DAB Series transmitters, this vulnerability poses a significant risk. Exploitation could lead to unauthorized administrative access, allowing attackers to alter device configurations, disrupt digital audio broadcasting services, or potentially use the compromised device as a foothold for further network intrusion. This could result in service outages, reputational damage, and regulatory non-compliance, especially under EU directives on critical infrastructure protection and data security. The impact extends beyond individual devices to potentially affect entire broadcast networks if multiple transmitters are compromised. Given the critical role of digital radio in public communication and emergency broadcasting, the vulnerability could also have societal implications. The lack of authentication requirement lowers the barrier for exploitation, increasing the urgency for mitigation in environments where these devices are accessible over internal or adjacent networks.
Mitigation Recommendations
1. Immediately restrict network access to the management interface of the Screen SFT DAB transmitters, ideally isolating them on dedicated management VLANs or physically separate networks. 2. Implement strict firewall rules to limit access to the userManager.cgx endpoint only to authorized administrative hosts. 3. Monitor network traffic for unusual JSON requests targeting the userManager.cgx endpoint to detect potential exploitation attempts. 4. Enforce strong network segmentation between broadcast infrastructure and general enterprise networks to reduce exposure. 5. Engage with DB Elettronica Telecomunicazioni SpA for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 6. Where possible, disable remote management features or require VPN access with multi-factor authentication for administrative access. 7. Conduct regular audits of device configurations and administrative accounts to detect unauthorized changes. 8. Develop incident response plans specific to broadcast infrastructure compromise scenarios to minimize downtime and impact.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands
CVE-2023-53740: CWE-862: Missing Authorization in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter
Description
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without providing the current credentials. Attackers can exploit the userManager.cgx endpoint by sending a crafted JSON request with a new MD5-hashed password to directly modify the admin account.
AI-Powered Analysis
Technical Analysis
CVE-2023-53740 is an authentication bypass vulnerability classified under CWE-862 affecting version 1.9.3 of the Screen SFT DAB Series, a compact radio DAB transmitter manufactured by DB Elettronica Telecomunicazioni SpA. The vulnerability arises due to missing authorization checks on the userManager.cgx endpoint, which handles administrative user management functions. An attacker can send a specially crafted JSON request containing a new MD5-hashed password to this endpoint without providing the current admin credentials or any form of authentication. This allows the attacker to overwrite the administrator password and gain full administrative access to the device. The vulnerability is remotely exploitable over the network (attack vector: adjacent network), requires low attack complexity, and does not require privileges or prior authentication. User interaction is needed only to send the crafted request. The impact on confidentiality and integrity is high since an attacker can fully control the device, potentially altering configurations or disrupting broadcast transmissions. Availability impact is low but could be elevated if the attacker intentionally disrupts services. The vulnerability does not require scope changes or chaining with other vulnerabilities. No patches or exploits are currently publicly available, but the high CVSS score (8.6) reflects the critical nature of the flaw. The device’s role in digital audio broadcasting infrastructure makes this vulnerability particularly sensitive, as unauthorized control could impact broadcast reliability and security.
Potential Impact
For European organizations, particularly broadcasters and telecom operators using the Screen SFT DAB Series transmitters, this vulnerability poses a significant risk. Exploitation could lead to unauthorized administrative access, allowing attackers to alter device configurations, disrupt digital audio broadcasting services, or potentially use the compromised device as a foothold for further network intrusion. This could result in service outages, reputational damage, and regulatory non-compliance, especially under EU directives on critical infrastructure protection and data security. The impact extends beyond individual devices to potentially affect entire broadcast networks if multiple transmitters are compromised. Given the critical role of digital radio in public communication and emergency broadcasting, the vulnerability could also have societal implications. The lack of authentication requirement lowers the barrier for exploitation, increasing the urgency for mitigation in environments where these devices are accessible over internal or adjacent networks.
Mitigation Recommendations
1. Immediately restrict network access to the management interface of the Screen SFT DAB transmitters, ideally isolating them on dedicated management VLANs or physically separate networks. 2. Implement strict firewall rules to limit access to the userManager.cgx endpoint only to authorized administrative hosts. 3. Monitor network traffic for unusual JSON requests targeting the userManager.cgx endpoint to detect potential exploitation attempts. 4. Enforce strong network segmentation between broadcast infrastructure and general enterprise networks to reduce exposure. 5. Engage with DB Elettronica Telecomunicazioni SpA for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 6. Where possible, disable remote management features or require VPN access with multi-factor authentication for administrative access. 7. Conduct regular audits of device configurations and administrative accounts to detect unauthorized changes. 8. Develop incident response plans specific to broadcast infrastructure compromise scenarios to minimize downtime and impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-12-07T13:16:38.432Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6939e1d75ab76fdc5f210952
Added to database: 12/10/2025, 9:10:47 PM
Last enriched: 12/10/2025, 9:11:17 PM
Last updated: 12/11/2025, 3:47:08 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14485: Command Injection in EFM ipTIME A3004T
LowCVE-2025-13764: CWE-269 Improper Privilege Management in ApusTheme WP CarDealer
CriticalCVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
MediumCVE-2025-67720: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Mayuri-Chan pyrofork
MediumCVE-2025-67719: CWE-620: Unverified Password Change in ibexa user
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.