CVE-2023-45911

9.8 CRITICAL

📋 TL;DR

This critical authentication bypass vulnerability in WIPOTEC GmbH ComScale allows unauthenticated attackers to log in as any user without requiring a password. It affects ComScale versions 4.3.29.21344 and 4.4.12.723, potentially exposing all organizations using these versions to unauthorized access.

💻 Affected Systems

Products:
  • WIPOTEC GmbH ComScale
Versions: v4.3.29.21344 and v4.4.12.723
Operating Systems: Windows (presumed based on typical ComScale deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both specified versions regardless of configuration. ComScale is typically used in industrial weighing and measurement systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative privileges, access sensitive data, manipulate configurations, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to the ComScale system allowing data theft, configuration changes, and disruption of weighing/measurement operations.

🟢

If Mitigated

Limited impact if system is isolated behind strong network controls and access restrictions, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows complete bypass of authentication mechanisms.
🏢 Internal Only: HIGH - Even internally, the authentication bypass enables unauthorized access to sensitive systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in GitHub repositories demonstrating the authentication bypass technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

Contact WIPOTEC GmbH directly for patching guidance as no public patch information is available.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to ComScale systems to only trusted IP addresses and networks

Access Control Lists

all

Implement strict firewall rules and network segmentation to limit exposure

🧯 If You Can't Patch

  • Implement network segmentation to isolate ComScale systems from untrusted networks
  • Deploy intrusion detection systems to monitor for authentication bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check ComScale version in application interface or configuration files. If version is 4.3.29.21344 or 4.4.12.723, system is vulnerable.

Check Version:

Check ComScale application interface or configuration files for version information

Verify Fix Applied:

Test authentication functionality by attempting to access the system without valid credentials. If access is denied, the vulnerability may be mitigated.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login without password validation
  • Login events from unexpected IP addresses or users

Network Indicators:

  • Unusual authentication traffic patterns
  • Direct access attempts to ComScale authentication endpoints

SIEM Query:

source="comscale" AND (event_type="authentication" AND result="success" AND auth_method="bypass")

🔗 References

📤 Share & Export