Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-30120

Опубликовано: 09 июл. 2021
Источник: nvd
CVSS3: 9.9
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

Kaseya VSA before 9.5.7 allows attackers to bypass the 2FA requirement. The need to use 2FA for authentication in enforce client-side instead of server-side and can be bypassed using a local proxy. Thus rendering 2FA useless. Detailed description --- During the login process, after the user authenticates with username and password, the server sends a response to the client with the booleans MFARequired and MFAEnroled. If the attacker has obtained a password of a user and used an intercepting proxy (e.g. Burp Suite) to change the value of MFARequered from True to False, there is no prompt for the second factor, but the user is still logged in.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:kaseya:vsa:*:*:*:*:-:*:*:*
Версия до 9.5.6 (включая)

EPSS

Процентиль: 56%
0.00336
Низкий

9.9 Critical

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-669

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

Kaseya VSA through 9.5.7 allows attackers to bypass the 2FA requirement.

EPSS

Процентиль: 56%
0.00336
Низкий

9.9 Critical

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-669