Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bd facschorus 3.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-29060
The FACSChorus workstation operating system does not restrict what devices can interact with its USB ports. If exploited, a threat actor with physical access to the workstation could gain access to system information and potentially exfiltrate data.
Bd Facschorus 5.0
Bd Facschorus 5.1
Bd Facschorus 3.0
Bd Facschorus 3.1
NA
CVE-2023-29061
There is no BIOS password on the FACSChorus workstation. A threat actor with physical access to the workstation can potentially exploit this vulnerability to access the BIOS configuration and modify the drive boot order and BIOS pre-boot authentication.
Bd Facschorus 5.0
Bd Facschorus 5.1
Bd Facschorus 3.0
Bd Facschorus 3.1
NA
CVE-2023-29062
The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result...
Bd Facschorus 5.0
Bd Facschorus 5.1
Bd Facschorus 3.0
Bd Facschorus 3.1
NA
CVE-2023-29063
The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of ...
Bd Facschorus 5.0
Bd Facschorus 5.1
Bd Facschorus 3.0
Bd Facschorus 3.1
NA
CVE-2023-29064
The FACSChorus software contains sensitive information stored in plaintext. A threat actor could gain hardcoded secrets used by the application, which include tokens and passwords for administrative accounts.
Bd Facschorus 5.0
Bd Facschorus 5.1
Bd Facschorus 3.0
Bd Facschorus 3.1
NA
CVE-2023-29065
The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
Bd Facschorus 5.0
Bd Facschorus 5.1
Bd Facschorus 3.0
Bd Facschorus 3.1
NA
CVE-2023-29066
The FACSChorus software does not properly assign data access privileges for operating system user accounts. A non-administrative OS account can modify information stored in the local application data folders.
Bd Facschorus 5.0
Bd Facschorus 5.1
Bd Facschorus 3.0
Bd Facschorus 3.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started