Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-9080

Summary
Assigner-lenovo
Assigner Org ID-da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At-28 Sep, 2018 | 20:00
Updated At-05 Aug, 2024 | 07:17
Rejected At-
Credits

Iomega and LenovoEMC NAS Web UI Vulnerabilities

For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, by setting the Iomega cookie to a known value before logging into the NAS's web application, the NAS will not provide the user a new cookie value. This allows an attacker who knows the cookie's value to compromise the user's session.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:lenovo
Assigner Org ID:da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At:28 Sep, 2018 | 20:00
Updated At:05 Aug, 2024 | 07:17
Rejected At:
▼CVE Numbering Authority (CNA)
Iomega and LenovoEMC NAS Web UI Vulnerabilities

For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, by setting the Iomega cookie to a known value before logging into the NAS's web application, the NAS will not provide the user a new cookie value. This allows an attacker who knows the cookie's value to compromise the user's session.

Affected Products
Vendor
Lenovo Group LimitedLenovo Group LTD
Product
Iomega StorCenter
Versions
Affected
  • From 4.1.402.34662 through 4.1.402.34662 (custom)
Vendor
Lenovo Group LimitedLenovo Group LTD
Product
LenovoEMC
Versions
Affected
  • From 4.1.402.34662 through 4.1.402.34662 (custom)
Vendor
Lenovo Group LimitedLenovo Group LTD
Product
EZ Media and Backup Center
Versions
Affected
  • From 4.1.402.34662 through 4.1.402.34662 (custom)
Problem Types
TypeCWE IDDescription
textN/ASession fixation
Type: text
CWE ID: N/A
Description: Session fixation
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/solutions/LEN-24224
x_refsource_CONFIRM
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-24224
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/solutions/LEN-24224
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-24224
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@lenovo.com
Published At:28 Sep, 2018 | 20:29
Updated At:08 Jan, 2019 | 12:19

For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, by setting the Iomega cookie to a known value before logging into the NAS's web application, the NAS will not provide the user a new cookie value. This allows an attacker who knows the cookie's value to compromise the user's session.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.05.9MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.0
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

Lenovo Group Limited
lenovo
>>storcenter_px12-450r_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_px12-450r_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px12-450r>>-
cpe:2.3:h:lenovo:storcenter_px12-450r:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px12-400r_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_px12-400r_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px12-400r>>-
cpe:2.3:h:lenovo:storcenter_px12-400r:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px4-300r_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_px4-300r_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px4-300r>>-
cpe:2.3:h:lenovo:storcenter_px4-300r:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px6-300d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_px6-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px6-300d>>-
cpe:2.3:h:lenovo:storcenter_px6-300d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px4-300d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_px4-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px4-300d>>-
cpe:2.3:h:lenovo:storcenter_px4-300d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px2-300d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_px2-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_px2-300d>>-
cpe:2.3:h:lenovo:storcenter_px2-300d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_ix4-300d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_ix4-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_ix4-300d>>-
cpe:2.3:h:lenovo:storcenter_ix4-300d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_ix2_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_ix2_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_ix2>>-
cpe:2.3:h:lenovo:storcenter_ix2:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_ix2-dl_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:storcenter_ix2-dl_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>storcenter_ix2-dl>>-
cpe:2.3:h:lenovo:storcenter_ix2-dl:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ez_media_\&_backup_center_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:ez_media_\&_backup_center_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ez_media_\&_backup_center>>-
cpe:2.3:h:lenovo:ez_media_\&_backup_center:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px12-450r_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:px12-450r_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px12-450r>>-
cpe:2.3:h:lenovo:px12-450r:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px12-400r_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:px12-400r_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px12-400r>>-
cpe:2.3:h:lenovo:px12-400r:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px4-400r_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:px4-400r_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px4-400r>>-
cpe:2.3:h:lenovo:px4-400r:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px4-300r_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:px4-300r_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px4-300r>>-
cpe:2.3:h:lenovo:px4-300r:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px6-300d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:px6-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px6-300d>>-
cpe:2.3:h:lenovo:px6-300d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px4-400d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:px4-400d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px4-400d>>-
cpe:2.3:h:lenovo:px4-400d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px4-300d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:px4-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px4-300d>>-
cpe:2.3:h:lenovo:px4-300d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px2-300d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:px2-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>px2-300d>>-
cpe:2.3:h:lenovo:px2-300d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ix4-300d_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:ix4-300d_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ix4-300d>>-
cpe:2.3:h:lenovo:ix4-300d:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ix2_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:ix2_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ix2>>-
cpe:2.3:h:lenovo:ix2:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ez_media_\&_backup_center_firmware>>4.1.402.34662
cpe:2.3:o:lenovo:ez_media_\&_backup_center_firmware:4.1.402.34662:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>ez_media_\&_backup_center>>-
cpe:2.3:h:lenovo:ez_media_\&_backup_center:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.lenovo.com/us/en/solutions/LEN-24224psirt@lenovo.com
Vendor Advisory
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-24224
Source: psirt@lenovo.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

63Records found

CVE-2014-0927
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.1||HIGH
EPSS-0.36% / 57.61%
||
7 Day CHG~0.00%
Published-20 Apr, 2018 | 21:00
Updated-06 Aug, 2024 | 09:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ActiveMQ admin user interface in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to bypass authentication by leveraging knowledge of the port number and webapp path. IBM X-Force ID: 92259.

Action-Not Available
Vendor-n/aIBM Corporation
Product-sterling_b2b_integratorsterling_file_gatewayn/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-16738
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.7||LOW
EPSS-0.38% / 58.66%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 00:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.

Action-Not Available
Vendor-tinc-vpnstarwindsoftwaren/aDebian GNU/Linux
Product-debian_linuxtincstarwind_virtual_sann/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-20590
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.26% / 48.95%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 18:54
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in GOT2000 series GT27 model VNC server versions 01.39.010 and prior, GOT2000 series GT25 model VNC server versions 01.39.010 and prior, GOT2000 series GT21 model GT2107-WTBD VNC server versions 01.40.000 and prior, GOT2000 series GT21 model GT2107-WTSD VNC server versions 01.40.000 and prior, GOT SIMPLE series GS21 model GS2110-WTBD-N VNC server versions 01.40.000 and prior and GOT SIMPLE series GS21 model GS2107-WTBD-N VNC server versions 01.40.000 and prior allows a remote unauthenticated attacker to gain unauthorized access via specially crafted packets when the "VNC server" function is used.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-gt2107-wtbd_firmwaregt2107-wtsd_firmwaregs2110-wtbd-ngs2107-wtbd-ngot2000_gt25_firmwaregot2000_gt27_firmwaregot2000_gt25gt2107-wtbdgs2107-wtbd-n_firmwaregot2000_gt27gt2107-wtsdgs2110-wtbd-n_firmwareGOT2000 series GT25 modelGOT2000 series GT21 model GT2107-WTSDGOT SIMPLE series GS21 model GS2107-WTBD-NGOT SIMPLE series GS21 model GS2110-WTBD-NGOT2000 series GT27 modelGOT2000 series GT21 model GT2107-WTBD
CWE ID-CWE-287
Improper Authentication
CVE-2007-5162
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.53% / 80.55%
||
7 Day CHG~0.00%
Published-01 Oct, 2007 | 00:00
Updated-07 Aug, 2024 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site.

Action-Not Available
Vendor-n/aRuby
Product-rubyn/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-4692
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.13% / 77.39%
||
7 Day CHG~0.00%
Published-15 Nov, 2007 | 00:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The tabbed browsing feature in Apple Safari 3 before Beta Update 3.0.4 on Windows, and Mac OS X 10.4 through 10.4.10, allows remote attackers to spoof HTTP authentication for other sites and possibly conduct phishing attacks by causing an authentication sheet to be displayed for a tab that is not active, which makes it appear as if it is associated with the active tab.

Action-Not Available
Vendor-n/aApple Inc.Microsoft Corporation
Product-windowssafarimac_os_x_servermac_os_xn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-19888
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.21% / 42.97%
||
7 Day CHG~0.00%
Published-24 Aug, 2020 | 14:38
Updated-04 Aug, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DBHcms v1.2.0 has an unauthorized operation vulnerability because there's no access control at line 175 of dbhcms\page.php for empty cache operation. This vulnerability can be exploited to empty a table.

Action-Not Available
Vendor-dbhcms_projectn/a
Product-dbhcmsn/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-5253
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.29% / 51.47%
||
7 Day CHG~0.00%
Published-12 Jan, 2013 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dl Download Ticket Service 0.3 through 0.9 allows remote attackers to login as an arbitrary user by supplying an authorization header.

Action-Not Available
Vendor-thegrn/a
Product-dln/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-15802
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-47.74% / 97.62%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 13:07
Updated-04 Aug, 2024 | 13:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, either LE or BR/EDR, and replace a bonding already established on the opposing transport, BR/EDR or LE, potentially overwriting an authenticated key with an unauthenticated key, or a key with greater entropy with one with less.

Action-Not Available
Vendor-bluetoothn/a
Product-bluetooth_core_specificationn/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-0944
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-4.3||MEDIUM
EPSS-0.47% / 63.82%
||
7 Day CHG~0.00%
Published-04 Jun, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aptdaemon 0.43 and earlier in Ubuntu 11.04, 11.10, and 12.04 LTS does not authenticate packages when the transaction is not simulated, which allows remote attackers to install arbitrary packages via a man-in-the-middle attack.

Action-Not Available
Vendor-sebastian_heinleinn/aCanonical Ltd.
Product-aptdaemonubuntu_linuxn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-0862
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-3.1||LOW
EPSS-0.28% / 50.65%
||
7 Day CHG~0.00%
Published-23 Mar, 2022 | 14:25
Updated-02 Aug, 2024 | 23:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ePO password change vulnerability

A lack of password change protection vulnerability in a depreciated API of McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote attacker to change the password of a compromised session without knowing the existing user's password. This functionality was removed from the User Interface in ePO 10 and the API has now been disabled. Other protection is in place to reduce the likelihood of this being successful through sending a link to a logged in user.

Action-Not Available
Vendor-McAfee, LLC
Product-epolicy_orchestratorMcAfee ePolicy Orchestrator (ePO)
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-287
Improper Authentication
CVE-2020-10888
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-5.9||MEDIUM
EPSS-0.16% / 37.90%
||
7 Day CHG~0.00%
Published-25 Mar, 2020 | 19:15
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to bypass authentication on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SSH port forwarding requests during initial setup. The issue results from the lack of proper authentication prior to establishing SSH port forwarding rules. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the WAN interface. Was ZDI-CAN-9664.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-ac1750ac1750_firmwareArcher A7
CWE ID-CWE-287
Improper Authentication
CVE-2019-7218
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.27% / 50.04%
||
7 Day CHG~0.00%
Published-13 May, 2019 | 18:19
Updated-04 Aug, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Citrix ShareFile before 19.23 allows a downgrade from two-factor authentication to one-factor authentication. An attacker with access to the offline victim's otp physical token or virtual app (like google authenticator) is able to bypass the first authentication phase (username/password mechanism) and log-in using username/otp combination only (phase 2 of 2FA).

Action-Not Available
Vendor-n/aCitrix (Cloud Software Group, Inc.)
Product-sharefilen/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-1520
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-3.7||LOW
EPSS-0.20% / 42.16%
||
7 Day CHG~0.00%
Published-12 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 9.7, 10,1, 10.5, and 11.1 is vulnerable to an unauthorized command that allows the database to be activated when authentication type is CLIENT. IBM X-Force ID: 129830.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-linux_kerneldb2_connectdb2windowsDB2 for Linux, UNIX and Windows
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • Next
Details not found