CVE-2023-53968
📋 TL;DR
This authentication bypass vulnerability in Screen SFT DAB 600/C firmware allows attackers to delete user accounts without credentials by exploiting IP address session binding. Attackers can send unauthorized requests to the userManager API using the same IP address as an authenticated session. Organizations using Screen SFT DAB 600/C devices with firmware version 1.9.3 are affected.
💻 Affected Systems
- Screen SFT DAB 600/C
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of device management with all user accounts deleted, rendering the device unusable for legitimate users and potentially disrupting broadcast operations.
Likely Case
Unauthorized deletion of administrative or user accounts leading to service disruption and potential device takeover.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external attackers from reaching vulnerable interfaces.
🎯 Exploit Status
Exploit requires network access to device management interface. No authentication needed once IP session binding is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.dbbroadcast.com
Restart Required: No
Instructions:
1. Check vendor website for firmware updates. 2. Download latest firmware. 3. Upload to device via management interface. 4. Apply firmware update following vendor instructions.
🔧 Temporary Workarounds
Network Segmentation
allIsolate device management interfaces from untrusted networks
Access Control Lists
allRestrict access to device management IP/ports to authorized IPs only
🧯 If You Can't Patch
- Implement strict network segmentation to isolate device from untrusted networks
- Deploy network-based intrusion detection to monitor for unauthorized API calls to userManager endpoints
🔍 How to Verify
Check if Vulnerable:
Check firmware version via device web interface or SSH. If version is 1.9.3, device is vulnerable.
Check Version:
Check via device web interface at System > Firmware or via SSH if available
Verify Fix Applied:
Verify firmware version is updated beyond 1.9.3. Test authentication requirements for userManager API endpoints.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized userManager API calls
- User account deletion events without authentication logs
- Multiple failed authentication attempts followed by successful userManager calls
Network Indicators:
- HTTP requests to /userManager endpoints from unauthorized IPs
- POST/DELETE requests to user management APIs without authentication headers
SIEM Query:
source="device_logs" AND (uri="/userManager" OR method="DELETE" AND uri CONTAINS "user") AND NOT auth_success="true"
🔗 References
- https://www.dbbroadcast.com
- https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
- https://www.exploit-db.com/exploits/51457
- https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-erase-account
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php