9.3
CVE-2017-14263
- EPSS 24.42%
- Veröffentlicht 11.09.2017 09:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Honeywell ≫ Enterprise Dvr Firmware Version-
Honeywell ≫ Maxpro Nvr Hybrid Se Firmware Version-
Honeywell ≫ Maxpro Nvr Hybrid Xe Firmware Version-
Honeywell ≫ Maxpro Nvr Se Firmware Version-
Honeywell ≫ Maxpro Nvr Xe Firmware Version-
Honeywell ≫ Fusion Iv Rev C Firmware Version-
Honeywell ≫ Maxpro Nvr Pe Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 24.42% | 0.956 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-384 Session Fixation
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.