Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53741: CWE-384: Session Fixation in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter

0
Medium
VulnerabilityCVE-2023-53741cvecve-2023-53741cwe-384
Published: Wed Dec 10 2025 (12/10/2025, 21:06:59 UTC)
Source: CVE Database V5
Vendor/Project: DB Elettronica Telecomunicazioni SpA
Product: Screen SFT DAB Series - Compact Radio DAB Transmitter

Description

Screen SFT DAB 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP address-bound session identifiers. Attackers can exploit the vulnerable API by intercepting and reusing established sessions to remove user accounts without proper authorization.

AI-Powered Analysis

AILast updated: 12/24/2025, 23:57:23 UTC

Technical Analysis

CVE-2023-53741 identifies a session fixation vulnerability (CWE-384) in the Screen SFT DAB 1.9.3 software, part of DB Elettronica Telecomunicazioni SpA's Compact Radio DAB Transmitter product line. The vulnerability arises from weak session management where session identifiers are bound solely to IP addresses, allowing attackers to intercept and reuse these session tokens to bypass authentication controls. This flaw enables unauthorized users to perform privileged actions, such as removing user accounts, by exploiting the vulnerable API endpoints. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and does not require prior authentication (PR:L) but does require some user interaction (UI:P). The vulnerability impacts confidentiality and integrity of session management (VC:L, VI:L), but does not affect availability or authentication mechanisms directly. The scope is limited to the affected product version 1.9.3, with no current public exploits reported. The vulnerability was published on December 10, 2025, with a CVSS 4.0 base score of 5.1, indicating medium severity. The lack of patch availability necessitates alternative mitigations to prevent exploitation. Given the product's role in digital audio broadcasting infrastructure, exploitation could disrupt administrative control and user management, potentially impacting broadcast operations.

Potential Impact

For European organizations, particularly those in the broadcasting and telecommunications sectors using DB Elettronica's Screen SFT DAB Series, this vulnerability could lead to unauthorized administrative access and manipulation of user accounts. This may result in operational disruptions, loss of control over broadcast transmitters, and potential data integrity issues. Confidentiality of session tokens is compromised, increasing the risk of further lateral attacks within the network. The ability to remove user accounts without authorization could degrade system management and recovery capabilities. Although availability is not directly impacted, the indirect effects on system administration could cause service interruptions. Given the critical role of broadcast infrastructure in public communication, exploitation could have broader implications for information dissemination and emergency alert systems in Europe.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement network-level controls to restrict access to the vulnerable API, such as IP whitelisting and segmentation of broadcast transmitter management networks. Employing VPNs or secure tunnels with strong authentication can reduce exposure. Monitoring and logging of session activities should be enhanced to detect unusual reuse of session identifiers or unauthorized account modifications. Session management configurations should be reviewed to ensure session tokens are not solely bound to IP addresses and incorporate additional entropy or user-specific factors. Where possible, upgrade to newer, patched versions once available. Conduct regular security assessments and penetration tests focusing on session management and API security. Educate administrators on recognizing potential session fixation attacks and enforce strict access controls on management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-07T13:16:38.432Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939e1d75ab76fdc5f21095a

Added to database: 12/10/2025, 9:10:47 PM

Last enriched: 12/24/2025, 11:57:23 PM

Last updated: 2/7/2026, 7:37:34 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats