Home

Description

Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change user passwords by exploiting weak session management controls. Attackers can reuse IP-bound session identifiers to issue unauthorized requests to the userManager API and modify user credentials without proper authentication.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-10 | Updated 2025-12-11 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-384: Session Fixation

Product status

Default status
unaffected

1.9.3
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php exploit

www.exploit-db.com/exploits/51456 (ExploitDB-51456) exploit

www.screen.it (Screen Product Homepage) product

www.dbbroadcast.com/...cts/radio/sft-dab-series-compact-air/ (DB Broadcast Official Product Page) product

www.dbbroadcast.com (DB Broadcast Website) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php (Zero Science Advisory URL) vendor-advisory

www.vulncheck.com/...ication-bypass-via-user-password-change (VulnCheck Advisory: Screen SFT DAB 1.9.3 Authentication Bypass via Session Management Weakness) third-party-advisory

cve.org (CVE-2023-53775)

nvd.nist.gov (CVE-2023-53775)

Download JSON