Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53776: CWE-384: Session Fixation in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter

0
High
VulnerabilityCVE-2023-53776cvecve-2023-53776cwe-384
Published: Wed Dec 10 2025 (12/10/2025, 21:12:22 UTC)
Source: CVE Database V5
Vendor/Project: DB Elettronica Telecomunicazioni SpA
Product: Screen SFT DAB Series - Compact Radio DAB Transmitter

Description

Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to exploit weak session management by reusing IP-bound session identifiers. Attackers can issue unauthorized requests to the device management API by leveraging the session binding mechanism to perform critical operations on the transmitter.

AI-Powered Analysis

AILast updated: 12/10/2025, 21:40:58 UTC

Technical Analysis

CVE-2023-53776 is a session fixation vulnerability classified under CWE-384, affecting version 1.9.3 of the Screen SFT DAB Series compact radio DAB transmitter produced by DB Elettronica Telecomunicazioni SpA. The core issue lies in weak session management where session identifiers are bound to IP addresses but can be reused by attackers, allowing them to bypass authentication mechanisms. This flaw enables unauthorized actors to send requests to the device's management API, which controls critical functions of the DAB transmitter. Since the vulnerability does not require any privileges or user interaction, it can be exploited remotely by an attacker with network access to the device. The CVSS 4.0 vector indicates the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no authentication required (AT:N), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability highly (VC:H, VI:H, VA:H), making it a critical risk for operational continuity and data security. No patches or known exploits are currently available, but the risk is significant given the critical nature of broadcast infrastructure. The vulnerability was published on December 10, 2025, and remains unpatched, necessitating immediate mitigation efforts.

Potential Impact

For European organizations, particularly broadcasters and telecom operators relying on DB Elettronica's Screen SFT DAB transmitters, this vulnerability poses a severe risk. Exploitation could allow attackers to manipulate broadcast signals, disrupt radio transmissions, or gain unauthorized control over critical infrastructure components. This could lead to service outages, misinformation dissemination, or compromise of sensitive operational data. Given the importance of DAB radio in many European countries for public communication and emergency broadcasts, the impact extends beyond commercial loss to public safety and information reliability. The vulnerability's ease of exploitation and lack of required authentication increase the threat level, especially in environments where devices are accessible from adjacent networks or insufficiently segmented. The absence of known exploits in the wild suggests a window for proactive defense, but also a potential for rapid exploitation once weaponized.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include isolating the affected devices on dedicated management VLANs with strict access control lists (ACLs) to limit network exposure. Employ network segmentation to ensure that only trusted administrators can reach the device management API. Monitor network traffic for unusual API requests or session reuse patterns indicative of session fixation attacks. Implement strong session management policies where possible, such as regenerating session identifiers upon authentication and avoiding IP-bound session tokens. Engage with DB Elettronica Telecomunicazioni SpA for updates on patches or firmware upgrades addressing this vulnerability. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous management API activity. Regularly audit device configurations and access logs to detect unauthorized access attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-08T23:43:00.993Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939e5605ab76fdc5f2656db

Added to database: 12/10/2025, 9:25:52 PM

Last enriched: 12/10/2025, 9:40:58 PM

Last updated: 12/11/2025, 4:17:50 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats