Lucene search

K
cve[email protected]CVE-2015-7285
HistoryNov 25, 2015 - 4:59 a.m.

CVE-2015-7285

2015-11-2504:59:01
CWE-287
web.nvd.nist.gov
21
cve-2015-7285
csl dualcom
gprs
firmware
authentication bypass
man-in-the-middle
arc
spoofing

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

45.1%

CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 do not require authentication from Alarm Receiving Center (ARC) servers, which allows man-in-the-middle attackers to bypass intended access restrictions via a spoofed HSxx response.

Affected configurations

NVD
Node
csl_dualcomgprs_cs2300-r_firmwareMatch1.25
OR
csl_dualcomgprs_cs2300-r_firmwareMatch3.53
AND
csl_dualcomgprsMatchcs2300-r

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

45.1%

Related for CVE-2015-7285