Логотип exploitDog
bind:"CVE-2023-40661" OR bind:"CVE-2023-40660"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-40661" OR bind:"CVE-2023-40660"

Количество 20

Количество 20

suse-cvrf логотип

SUSE-SU-2023:4104-1

около 2 лет назад

Security update for opensc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4089-1

около 2 лет назад

Security update for opensc

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7876

почти 2 года назад

ELSA-2023-7876: opensc security update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20240402-21

больше 1 года назад

Множественные уязвимости opensc

CVSS3: 6.6
EPSS: Низкий
oracle-oval логотип

ELSA-2023-7879

почти 2 года назад

ELSA-2023-7879: opensc security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2023-40660

около 2 лет назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
redhat логотип

CVE-2023-40660

около 2 лет назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
nvd логотип

CVE-2023-40660

около 2 лет назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
msrc логотип

CVE-2023-40660

больше 1 года назад

CVSS3: 6.6
EPSS: Низкий
debian логотип

CVE-2023-40660

около 2 лет назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. ...

CVSS3: 6.6
EPSS: Низкий
ubuntu логотип

CVE-2023-40661

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
redhat логотип

CVE-2023-40661

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2023-40661

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
msrc логотип

CVE-2023-40661

больше 1 года назад

CVSS3: 6.4
EPSS: Низкий
debian логотип

CVE-2023-40661

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packa ...

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-7635-x5f9-5458

около 2 лет назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
fstec логотип

BDU:2024-02589

около 2 лет назад

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильной аутентификацией, позволяющая нарушителю получить несанкционированный доступ, выполнить произвольные действия или скомпрометировать систему

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-2c2j-2pgv-gfgc

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
fstec логотип

BDU:2024-02588

около 2 лет назад

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4065-1

около 2 лет назад

Security update for opensc

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2023:4104-1

Security update for opensc

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4089-1

Security update for opensc

около 2 лет назад
oracle-oval логотип
ELSA-2023-7876

ELSA-2023-7876: opensc security update (MODERATE)

почти 2 года назад
redos логотип
ROS-20240402-21

Множественные уязвимости opensc

CVSS3: 6.6
больше 1 года назад
oracle-oval логотип
ELSA-2023-7879

ELSA-2023-7879: opensc security update (MODERATE)

почти 2 года назад
ubuntu логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 6.6
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. ...

CVSS3: 6.6
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 6.4
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packa ...

CVSS3: 5.4
0%
Низкий
около 2 лет назад
github логотип
GHSA-7635-x5f9-5458

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-02589

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильной аутентификацией, позволяющая нарушителю получить несанкционированный доступ, выполнить произвольные действия или скомпрометировать систему

CVSS3: 6.6
0%
Низкий
около 2 лет назад
github логотип
GHSA-2c2j-2pgv-gfgc

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-02588

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.4
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4065-1

Security update for opensc

около 2 лет назад

Уязвимостей на страницу