9
CVE-2024-23309
- EPSS 0.05%
- Veröffentlicht 30.10.2024 14:15:04
- Zuletzt bearbeitet 21.11.2024 08:57:28
- Quelle talos-cna@cisco.com
- CVE-Watchlists
- Unerledigt
The LevelOne WBR-6012 router with firmware R0.40e6 has an authentication bypass vulnerability in its web application due to reliance on client IP addresses for authentication. Attackers could spoof an IP address to gain unauthorized access without needing a session token.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Level1 ≫ Wbr-6012 Firmware Versionr0.40e6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.168 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| talos-cna@cisco.com | 9 | 2.2 | 6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
CWE-291 Reliance on IP Address for Authentication
The product uses an IP address for authentication.