CVE-2023-53741

Screen SFT DAB 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP address-bound session identifiers. Attackers can exploit the vulnerable API by intercepting and reusing established sessions to remove user accounts without proper authorization.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dbbroadcast:sft_dab_015\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_015\/c:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:dbbroadcast:sft_dab_050\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_050\/c:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:dbbroadcast:sft_dab_150\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_150\/c:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:dbbroadcast:sft_dab_300\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_300\/c:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:*

History

17 Dec 2025, 20:17

Type Values Removed Values Added
CPE cpe:2.3:o:dbbroadcast:sft_dab_150\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_050\/c:-:*:*:*:*:*:*:*
cpe:2.3:o:dbbroadcast:sft_dab_015\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_300\/c:-:*:*:*:*:*:*:*
cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:*
cpe:2.3:o:dbbroadcast:sft_dab_050\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_150\/c:-:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_015\/c:-:*:*:*:*:*:*:*
cpe:2.3:o:dbbroadcast:sft_dab_300\/c_firmware:1.9.3:*:*:*:*:*:*:*
References () https://www.dbbroadcast.com - () https://www.dbbroadcast.com - Product
References () https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ - () https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ - Product
References () https://www.exploit-db.com/exploits/51457 - () https://www.exploit-db.com/exploits/51457 - Exploit, Third Party Advisory
References () https://www.screen.it - () https://www.screen.it - Product
References () https://www.vulncheck.com/advisories/screen-sft-dab-authentication-bypass-via-ip-session-management - () https://www.vulncheck.com/advisories/screen-sft-dab-authentication-bypass-via-ip-session-management - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php - Third Party Advisory
First Time Dbbroadcast sft Dab 050\/c
Dbbroadcast sft Dab 015\/c
Dbbroadcast
Dbbroadcast sft Dab 600\/c
Dbbroadcast sft Dab 600\/c Firmware
Dbbroadcast sft Dab 150\/c Firmware
Dbbroadcast sft Dab 050\/c Firmware
Dbbroadcast sft Dab 300\/c Firmware
Dbbroadcast sft Dab 150\/c
Dbbroadcast sft Dab 015\/c Firmware
Dbbroadcast sft Dab 300\/c
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

11 Dec 2025, 19:15

Type Values Removed Values Added
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php -

10 Dec 2025, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-10 21:16

Updated : 2025-12-18 21:15


NVD link : CVE-2023-53741

Mitre link : CVE-2023-53741

CVE.ORG link : CVE-2023-53741


JSON object : View

Products Affected

dbbroadcast

  • sft_dab_600\/c
  • sft_dab_300\/c_firmware
  • sft_dab_015\/c
  • sft_dab_600\/c_firmware
  • sft_dab_050\/c_firmware
  • sft_dab_300\/c
  • sft_dab_150\/c
  • sft_dab_150\/c_firmware
  • sft_dab_050\/c
  • sft_dab_015\/c_firmware
CWE
CWE-384

Session Fixation