10
CVE-2020-8234
- EPSS 1.8%
- Veröffentlicht 21.08.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:38:33
- Quelle support@hackerone.com
- CVE-Watchlists
- Unerledigt
A vulnerability exists in The EdgeMax EdgeSwitch firmware <v1.9.1 where the EdgeSwitch legacy web interface SIDSSL cookie for admin can be guessed, enabling the attacker to obtain high privileges and get a root shell by a Command injection.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ui ≫ Edgemax Firmware Version < 1.9.1
Ui ≫ Ep-s16 Version-
Ui ≫ Es-12f Version-
Ui ≫ Es-16-150w Version-
Ui ≫ Es-16-xg Version-
Ui ≫ Es-24-250w Version-
Ui ≫ Es-24-500w Version-
Ui ≫ Es-24-lite Version-
Ui ≫ Es-48-500w Version-
Ui ≫ Es-48-750w Version-
Ui ≫ Es-48-lite Version-
Ui ≫ Es-8-150w Version-
Ui ≫ Es-12f Version-
Ui ≫ Es-16-150w Version-
Ui ≫ Es-16-xg Version-
Ui ≫ Es-24-250w Version-
Ui ≫ Es-24-500w Version-
Ui ≫ Es-24-lite Version-
Ui ≫ Es-48-500w Version-
Ui ≫ Es-48-750w Version-
Ui ≫ Es-48-lite Version-
Ui ≫ Es-8-150w Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.8% | 0.822 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-613 Insufficient Session Expiration
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."