CVE-2023-33760

SpliceCom Maximiser Soft PBX v1.5 and before was discovered to utilize a default SSL certificate. This issue can allow attackers to eavesdrop on communications via a man-in-the-middle attack.
References
Link Resource
https://github.com/twignet/splicecom Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:splicecom:maximiser_soft_pbx:*:*:*:*:*:*:*:*

History

31 Jan 2024, 21:05

Type Values Removed Values Added
References () https://github.com/twignet/splicecom - () https://github.com/twignet/splicecom - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Splicecom
Splicecom maximiser Soft Pbx
CPE cpe:2.3:a:splicecom:maximiser_soft_pbx:*:*:*:*:*:*:*:*
CWE CWE-295

25 Jan 2024, 13:38

Type Values Removed Values Added
Summary
  • (es) Se descubrió que SpliceCom Maximiser Soft PBX v1.5 y anteriores utiliza un certificado SSL predeterminado. Este problema puede permitir a los atacantes espiar las comunicaciones mediante un ataque de man-in-the-middle.

25 Jan 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-25 08:15

Updated : 2024-01-31 21:05


NVD link : CVE-2023-33760

Mitre link : CVE-2023-33760

CVE.ORG link : CVE-2023-33760


JSON object : View

Products Affected

splicecom

  • maximiser_soft_pbx
CWE
CWE-295

Improper Certificate Validation