Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rv56-hq65-5hgg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.

An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.

EPSS

Процентиль: 35%
0.00146
Низкий

7.2 High

CVSS3

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 7.2
nvd
почти 6 лет назад

An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.

CVSS3: 7.2
fstec
почти 6 лет назад

Уязвимость микропрограммного обеспечения беспроводной точки доступа для промышленных систем Moxa AWK-3131A, связанная с ошибками обработки имени хоста, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 35%
0.00146
Низкий

7.2 High

CVSS3

Дефекты

CWE-287