CVE-2023-31152
10.05.2023, 20:15
An Authentication Bypass Using an Alternate Path or Channel vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface allows Authentication Bypass. See SEL Service Bulletin dated 2022-11-15 for more details.Enginsight
Vendor | Product | Version |
---|---|---|
selinc | sel-2241_rtac_module_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3350_firmware | r148-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3505_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3505-3_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3530_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3530-4_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3532_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3555_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3560e_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
selinc | sel-3560s_firmware | r147-v0 ≤ 𝑥 < r150-v2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-288 - Authentication Bypass Using an Alternate Path or ChannelA product requires authentication, but the product has an alternate path or channel that does not require authentication.
- CWE-287 - Improper AuthenticationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.