CVE-2023-32657

Weintek Weincloud Improper Restriction of Excessive Authentication Attempts

Description

Weintek Weincloud v0.13.6 could allow an attacker to efficiently develop a brute force attack on credentials with authentication hints from error message responses.

Remediation

Solution:

  • ​Weintek has updated their account API to v0.13.8, which has fixed the issue. This fix does not require any action for users.

Workaround:

  • ​Additional mitigations are recommended to help reduce risk: * ​Log in on trusted computers if possible. Log out after usage on un-trusted ones. * ​On the HMIs, if the online services are not used, set to offline mode for EasyAccess 2.0 or Dashboard services using system reserved addresses. * ​Regularly change passwords to reduce risks. * ​Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible- only applicable devices and/or systems have access to the internet.

Category

5.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.07%
Third-Party Advisory cisa.gov
Affected: Weintek Weincloud
Published at:
Updated at:

References

Link Tags
https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-04 third party advisory us government resource

Frequently Asked Questions

What is the severity of CVE-2023-32657?
CVE-2023-32657 has been scored as a medium severity vulnerability.
How to fix CVE-2023-32657?
To fix CVE-2023-32657: ​Weintek has updated their account API to v0.13.8, which has fixed the issue. This fix does not require any action for users.
Is CVE-2023-32657 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-32657 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-32657?
CVE-2023-32657 affects Weintek Weincloud.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.