Products
CIRCUTOR Q-SMT
- 1.0.4
Source
cve-coordination@incibe.es
Tags
CVE-2024-8888 details
Published : Sept. 18, 2024, 12:15 p.m.
Last Modified : Sept. 18, 2024, 12:15 p.m.
Last Modified : Sept. 18, 2024, 12:15 p.m.
Description
An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10.0 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-613 | Insufficient Session Expiration | According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization." |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
10.0
Exploitability Score
3.9
Impact Score
6.0
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
References
URL | Source |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products | cve-coordination@incibe.es |
This website uses the NVD API, but is not approved or certified by it.