CVE-2023-53741
Published: 10 December 2025
Summary
CVE-2023-53741 is a high-severity Session Fixation (CWE-384) vulnerability in Dbbroadcast Sft Dab 015\/C Firmware. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 49.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and AC-12 (Session Termination).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires mechanisms to protect communications session authenticity, directly preventing replay attacks exploiting IP-bound session identifiers.
Mandates automatic session termination after defined conditions, reducing the window for interception and reuse of vulnerable sessions.
Requires re-authentication for specific actions or time intervals, limiting damage from unauthorized reuse of compromised sessions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables authentication bypass via interception and replay of IP-bound session identifiers on a remote API, directly facilitating remote service exploitation (T1210) and use of stolen web session material (T1550.004).
NVD Description
Screen SFT DAB 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP address-bound session identifiers. Attackers can exploit the vulnerable API by intercepting and reusing established sessions to remove user accounts without…
more
proper authorization.
Deeper analysisAI
CVE-2023-53741 is a weak session management vulnerability (CWE-384) in Screen SFT DAB version 1.9.3, where session identifiers are bound to IP addresses. This flaw allows attackers to bypass authentication controls by intercepting and reusing established session identifiers via the vulnerable API. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), highlighting high integrity and availability impacts with no confidentiality loss.
Attackers with adjacent network access can exploit this without privileges or user interaction by capturing a valid session from a legitimate user and replaying the IP-bound session ID to the API. Successful exploitation enables unauthorized actions, such as removing user accounts, compromising system integrity and availability.
Advisories and related resources, including VulnCheck's detailed report (https://www.vulncheck.com/advisories/screen-sft-dab-authentication-bypass-via-ip-session-management), vendor pages from DB Broadcast (https://www.dbbroadcast.com and https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/) and Screen (https://www.screen.it), provide further context. A proof-of-concept exploit is publicly available on Exploit-DB (https://www.exploit-db.com/exploits/51457), underscoring the need to review these for patch availability and mitigation guidance.
Details
- CWE(s)