Required CVE Record Information
Description
Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.
CVSS 1 Total
Score | Severity | Version | Vector String |
---|---|---|---|
7.5 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
Product Status
Learn moreVersions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Credits
- Andres Hinnosaar
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.