Brief

Summary:

The document is a View CSAF (Common Vulnerability Scoring System Architecture Framework) report that outlines four security vulnerabilities affecting Electrolink's FM/DAB/TV Transmitter equipment. The vulnerabilities are:

1. Authentication Bypass by Assumed-Immutable Data (CVSS v3: 8.8)
2. Reliance on Cookies without Validation and Integrity Checking (CVSS v3: 8.8)
3. Missing Authentication for Critical Function (CVSS v3: 7.5)
4. Cleartext Storage of Sensitive Information (CVSS v3: 7.5)

These vulnerabilities can allow an attacker to gain full system access, stop the device from transmitting, escalate privileges, change credentials, and execute arbitrary code. The report provides information on the affected products, technical details, and recommendations for mitigation.

Mitigations:

The report recommends minimizing network exposure, locating control systems behind firewalls, and using secure remote access methods. It also encourages organizations to perform proper impact analysis and risk assessments prior to deploying defensive measures.

Update History:

The report was initially published on April 16, 2024.

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Electrolink Equipment: FM/DAB/TV Transmitter Vulnerabilities: Authentication Bypass by Assumed-Immutable Data, Reliance on Cookies without Validation and Integrity Checking, Missing Authentication for Critical Function, Cleartext Storage of Sensitive Information 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow

This content is restricted.

Highlights content goes here...

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Electrolink Equipment: FM/DAB/TV Transmitter Vulnerabilities: Authentication Bypass by Assumed-Immutable Data, Reliance on Cookies without Validation and Integrity Checking, Missing Authentication for Critical Function, Cleartext Storage of Sensitive Information 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow

This content is restricted.

Cybersecurity and Infrastructure Security Agency

Quick Insight
RADA.AI
RADA.AI
Hello! I'm RADA.AI - Regulatory Analysis and Decision Assistance. Your Intelligent guide for compliance and decision-making. How can i assist you today?
Suggested

Form successfully submitted. One of our GRI rep will contact you shortly

Thanking You!

Enter your Email

Enter your registered username/email id.

Enter your Email

Enter your email id below to signup.
Individual Plan
$125 / month OR $1250 / year
Features
Best for: Researchers, Legal professionals, Academics
Enterprise Plan
Contact for Pricing
Features
Best for: Law Firms, Corporations, Government Bodies