Undergoing Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
Products
Vonets industrial wifi bridge relays and wifi bridge repeaters
- 3.3.23.6.9 and prior
Source
ics-cert@hq.dhs.gov
Tags
CVE-2024-42001 details
Published : Aug. 12, 2024, 1:38 p.m.
Last Modified : Aug. 12, 2024, 1:41 p.m.
Last Modified : Aug. 12, 2024, 1:41 p.m.
Description
An improper authentication vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior enables an unauthenticated remote attacker to bypass authentication via a specially crafted direct request when another user has an active session.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8.6 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-425 | Direct Request ('Forced Browsing') | The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
Base Score
8.6
Exploitability Score
3.9
Impact Score
4.7
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
References
URL | Source |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08 | ics-cert@hq.dhs.gov |
This website uses the NVD API, but is not approved or certified by it.