Weak Checksum Algorithm Allows Unauthorized Configuration Changes

Weak Checksum Algorithm Allows Unauthorized Configuration Changes

CVE-2023-44319 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device.

Learn more about our Web Application Penetration Testing UK.