8.8
CVE-2023-41086
- EPSS 0.32%
- Veröffentlicht 03.10.2023 01:15:56
- Zuletzt bearbeitet 21.11.2024 08:20:32
- Quelle vultures@jpcert.or.jp
- CVE-Watchlists
- Unerledigt
Cross-site request forgery (CSRF) vulnerability exists in FURUNO SYSTEMS wireless LAN access point devices. If a user views a malicious page while logged in, unintended operations may be performed. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Furunosystems ≫ Acera 1210 Firmware Version <= 02.36
Furunosystems ≫ Acera 1150i Firmware Version <= 01.35
Furunosystems ≫ Acera 1150w Firmware Version <= 01.35
Furunosystems ≫ Acera 1110 Firmware Version <= 01.76
Furunosystems ≫ Acera 1020 Firmware Version <= 01.86
Furunosystems ≫ Acera 1010 Firmware Version <= 01.86
Furunosystems ≫ Acera 950 Firmware Version <= 01.60
Furunosystems ≫ Acera 850f Firmware Version <= 01.60
Furunosystems ≫ Acera 900 Firmware Version <= 02.54
Furunosystems ≫ Acera 850m Firmware Version <= 02.06
Furunosystems ≫ Acera 810 Firmware Version <= 03.74
Furunosystems ≫ Acera 800st Firmware Version <= 07.35
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.32% | 0.546 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.