Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-5719


The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, invalid values will be included, potentially truncating the string if a NUL is encountered. If the simplified password is not detected by the administrator, the device might be left in a vulnerable state as a result of more-easily compromised credentials. Note that passwords entered via the Crimson system web server do not suffer from this vulnerability.


Published

2023-11-06T20:15:07.950

Last Modified

2024-11-21T08:42:21.013

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-158
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redlion crimson < 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Application redlion crimson 3.2 Yes
Hardware redlion da50a - No
Hardware redlion da70a - No

References