CVE-2023-53775: CWE-384: Session Fixation in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change user passwords by exploiting weak session management controls. Attackers can reuse IP-bound session identifiers to issue unauthorized requests to the userManager API and modify user credentials without proper authentication.
AI Analysis
Technical Summary
CVE-2023-53775 is a session fixation vulnerability categorized under CWE-384, found in version 1.9.3 of the Screen SFT DAB Series Compact Radio DAB Transmitter by DB Elettronica Telecomunicazioni SpA. The vulnerability arises from weak session management controls that allow an attacker to reuse session identifiers bound to an IP address. By exploiting this flaw, an attacker can bypass authentication mechanisms and send unauthorized requests to the userManager API, specifically to change user passwords without proper authentication. The attack vector is network-based (AV:A), requiring the attacker to be on the same network or have network access to the device. No privileges or user interaction are required, making exploitation relatively straightforward once access is gained. The vulnerability impacts the integrity of user credentials, potentially allowing attackers to gain persistent unauthorized access to the device. Although no public exploits are currently known, the high CVSS score (7.1) reflects the significant risk posed by this vulnerability. The device is typically used in digital audio broadcasting (DAB) infrastructure, which is critical for radio transmission services. The lack of vendor patches at the time of disclosure increases the urgency for interim mitigations. The vulnerability does not affect confidentiality or availability directly but compromises integrity and could lead to further attacks if exploited.
Potential Impact
For European organizations, particularly those involved in public and private digital radio broadcasting, this vulnerability poses a significant risk. Unauthorized password changes can lead to full device compromise, allowing attackers to manipulate broadcast content, disrupt services, or use the device as a foothold for lateral movement within the network. This could impact the integrity of broadcast transmissions, potentially causing misinformation or service outages. Given the critical nature of broadcasting infrastructure in Europe, especially in countries with extensive DAB networks, exploitation could have wide-reaching effects on communication reliability and public trust. Additionally, compromised devices might be leveraged in broader cyber campaigns targeting media and communication sectors. The vulnerability's network-based attack vector means that organizations with inadequate network segmentation or exposed management interfaces are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
European organizations should immediately implement strict network segmentation to isolate Screen SFT DAB devices from general IT and internet-facing networks. Access to the userManager API should be restricted via firewall rules and VPNs to trusted administrators only. Continuous monitoring and logging of API requests should be enabled to detect anomalous password change attempts or session reuse patterns. Organizations should enforce strong session management policies, including regenerating session identifiers upon authentication and binding sessions to more than just IP addresses if possible. Until vendor patches are available, consider disabling remote management features or restricting management access to physically secure networks. Regularly audit device firmware versions and configurations to identify vulnerable instances. Engage with DB Elettronica Telecomunicazioni SpA for updates and apply patches promptly once released. Additionally, implement multi-factor authentication if supported to add an extra layer of security against unauthorized access.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden, Norway, Finland
CVE-2023-53775: CWE-384: Session Fixation in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter
Description
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change user passwords by exploiting weak session management controls. Attackers can reuse IP-bound session identifiers to issue unauthorized requests to the userManager API and modify user credentials without proper authentication.
AI-Powered Analysis
Technical Analysis
CVE-2023-53775 is a session fixation vulnerability categorized under CWE-384, found in version 1.9.3 of the Screen SFT DAB Series Compact Radio DAB Transmitter by DB Elettronica Telecomunicazioni SpA. The vulnerability arises from weak session management controls that allow an attacker to reuse session identifiers bound to an IP address. By exploiting this flaw, an attacker can bypass authentication mechanisms and send unauthorized requests to the userManager API, specifically to change user passwords without proper authentication. The attack vector is network-based (AV:A), requiring the attacker to be on the same network or have network access to the device. No privileges or user interaction are required, making exploitation relatively straightforward once access is gained. The vulnerability impacts the integrity of user credentials, potentially allowing attackers to gain persistent unauthorized access to the device. Although no public exploits are currently known, the high CVSS score (7.1) reflects the significant risk posed by this vulnerability. The device is typically used in digital audio broadcasting (DAB) infrastructure, which is critical for radio transmission services. The lack of vendor patches at the time of disclosure increases the urgency for interim mitigations. The vulnerability does not affect confidentiality or availability directly but compromises integrity and could lead to further attacks if exploited.
Potential Impact
For European organizations, particularly those involved in public and private digital radio broadcasting, this vulnerability poses a significant risk. Unauthorized password changes can lead to full device compromise, allowing attackers to manipulate broadcast content, disrupt services, or use the device as a foothold for lateral movement within the network. This could impact the integrity of broadcast transmissions, potentially causing misinformation or service outages. Given the critical nature of broadcasting infrastructure in Europe, especially in countries with extensive DAB networks, exploitation could have wide-reaching effects on communication reliability and public trust. Additionally, compromised devices might be leveraged in broader cyber campaigns targeting media and communication sectors. The vulnerability's network-based attack vector means that organizations with inadequate network segmentation or exposed management interfaces are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
European organizations should immediately implement strict network segmentation to isolate Screen SFT DAB devices from general IT and internet-facing networks. Access to the userManager API should be restricted via firewall rules and VPNs to trusted administrators only. Continuous monitoring and logging of API requests should be enabled to detect anomalous password change attempts or session reuse patterns. Organizations should enforce strong session management policies, including regenerating session identifiers upon authentication and binding sessions to more than just IP addresses if possible. Until vendor patches are available, consider disabling remote management features or restricting management access to physically secure networks. Regularly audit device firmware versions and configurations to identify vulnerable instances. Engage with DB Elettronica Telecomunicazioni SpA for updates and apply patches promptly once released. Additionally, implement multi-factor authentication if supported to add an extra layer of security against unauthorized access.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-12-08T23:43:00.992Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6939e5605ab76fdc5f2656d3
Added to database: 12/10/2025, 9:25:52 PM
Last enriched: 12/10/2025, 9:41:12 PM
Last updated: 12/11/2025, 3:47:08 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
MediumCVE-2025-10163: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in fernandobt List category posts
MediumCVE-2025-14485: Command Injection in EFM ipTIME A3004T
LowCVE-2025-13764: CWE-269 Improper Privilege Management in ApusTheme WP CarDealer
CriticalCVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.