May 15, 2023, 3:24 p.m. |

Packet Storm packetstormsecurity.com

Screen SFT DAB 600/C suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

abusing account address authentication authentication bypass bypass controls device exploit ip address management nat network operations screen session victim

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

IAM Engineer - SailPoint IIQ

@ IDMWORKS | Remote USA

Manager, Network Security

@ NFL | New York City, United States

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden

Senior Security Consultant

@ LRQA | USA, US