Логотип exploitDog
bind:CVE-2023-40660
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-40660

Количество 12

Количество 12

ubuntu логотип

CVE-2023-40660

больше 1 года назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
redhat логотип

CVE-2023-40660

почти 2 года назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
nvd логотип

CVE-2023-40660

больше 1 года назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
msrc логотип

CVE-2023-40660

12 месяцев назад

CVSS3: 6.6
EPSS: Низкий
debian логотип

CVE-2023-40660

больше 1 года назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. ...

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-7635-x5f9-5458

больше 1 года назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
fstec логотип

BDU:2024-02589

больше 1 года назад

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильной аутентификацией, позволяющая нарушителю получить несанкционированный доступ, выполнить произвольные действия или скомпрометировать систему

CVSS3: 6.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4104-1

больше 1 года назад

Security update for opensc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4089-1

больше 1 года назад

Security update for opensc

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7876

больше 1 года назад

ELSA-2023-7876: opensc security update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20240402-21

около 1 года назад

Множественные уязвимости opensc

CVSS3: 6.6
EPSS: Низкий
oracle-oval логотип

ELSA-2023-7879

больше 1 года назад

ELSA-2023-7879: opensc security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 6.6
0%
Низкий
12 месяцев назад
debian логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. ...

CVSS3: 6.6
0%
Низкий
больше 1 года назад
github логотип
GHSA-7635-x5f9-5458

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-02589

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильной аутентификацией, позволяющая нарушителю получить несанкционированный доступ, выполнить произвольные действия или скомпрометировать систему

CVSS3: 6.6
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4104-1

Security update for opensc

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4089-1

Security update for opensc

больше 1 года назад
oracle-oval логотип
ELSA-2023-7876

ELSA-2023-7876: opensc security update (MODERATE)

больше 1 года назад
redos логотип
ROS-20240402-21

Множественные уязвимости opensc

CVSS3: 6.6
около 1 года назад
oracle-oval логотип
ELSA-2023-7879

ELSA-2023-7879: opensc security update (MODERATE)

больше 1 года назад

Уязвимостей на страницу