9.8
CVE-2022-30623
- EPSS 0.14%
- Veröffentlicht 18.07.2022 13:15:10
- Zuletzt bearbeitet 21.11.2024 07:03:02
- Quelle cna@cyber.gov.il
- CVE-Watchlists
- Unerledigt
The server checks the user's cookie in a non-standard way, and a value is entered in the cookie value name of the status and its value is set to true to bypass the identification with the system using a username and password.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Chcnav ≫ P5e Gnss Firmware Version4.1
Chcnav ≫ P5e Gnss Firmware Version4.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.14% | 0.344 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| cna@cyber.gov.il | 5.9 | 2.5 | 3.4 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.