Description
A vulnerability found in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to Add Network Traffic Control Type Rule.
Affected Software
{"id": "CVE-2020-23586", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2020-23586", "description": "A vulnerability found in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to Add Network Traffic Control Type Rule.", "published": "2022-11-23T02:15:00", "modified": "2022-11-23T20:35:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23586", "reporter": "cve@mitre.org", "references": ["https://github.com/huzaifahussain98/CVE-2020-23586"], "cvelist": ["CVE-2020-23586"], "immutableFields": [], "lastseen": "2022-11-23T21:38:21", "viewCount": 10, "enchantments": {"score": {"value": 4.8, "vector": "NONE"}, "twitter": {"counter": 7, "tweets": [{"link": "https://twitter.com/4ng3n01r3/status/1595325158642061312", "text": "/hashtag/CyberSecurity?src=hashtag_click /hashtag/Security?src=hashtag_click /hashtag/CERT?src=hashtag_click /hashtag/CVE?src=hashtag_click /hashtag/Nist?src=hashtag_click /hashtag/breach?src=hashtag_click /hashtag/vulnerability?src=hashtag_click : CVE-2020-23586 https://t.co/bpDth09q5A", "author": "4ng3n01r3", "author_photo": "https://pbs.twimg.com/profile_images/1566682883670118404/pHq2hcfz_400x400.jpg"}, {"link": "https://twitter.com/vulnonym/status/1595313824516943873", "text": "CVE-2020-23586 shall henceforth be named Rural Caper\nhttps://t.co/aioUpU0H6E", "author": "vulnonym", "author_photo": "https://pbs.twimg.com/profile_images/1235605772878438405/6p9IJVtn_400x400.jpg"}, {"link": "https://twitter.com/xanadulinux/status/1595309351601840128", "text": "CVE-2020-23586 https://t.co/LXfxUnQiLM", "author": "xanadulinux", "author_photo": "https://pbs.twimg.com/profile_images/466955855892455424/BAnnwGhT_400x400.png"}, {"link": "https://twitter.com/4ng3n01r3/status/1595536543262842907", "text": "/hashtag/CyberSecurity?src=hashtag_click /hashtag/Security?src=hashtag_click /hashtag/CERT?src=hashtag_click /hashtag/CVE?src=hashtag_click /hashtag/Nist?src=hashtag_click /hashtag/breach?src=hashtag_click /hashtag/vulnerability?src=hashtag_click : CVE-2020-23586 (op-xt71000n_firmware) https://t.co/bpDth08Sg2", "author": "4ng3n01r3", "author_photo": "https://pbs.twimg.com/profile_images/1566682883670118404/pHq2hcfz_400x400.jpg"}]}, "affected_software": {"major_version": [{"name": "optilinknetwork op-xt71000n firmware", "version": 3}]}, "vulnersScore": 4.8}, "_state": {"dependencies": 1669239584, "score": 1669239754, "twitter": 1669243223, "affected_software_major_version": 1671611801}, "_internal": {"score_hash": "c81c47f8418d45d6f0fe83249d8150b8"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028"], "cpe23": ["cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*"], "cwe": ["CWE-352"], "affectedSoftware": [{"cpeName": "optilinknetwork:op-xt71000n_firmware", "version": "3.3.1-191028", "operator": "eq", "name": "optilinknetwork op-xt71000n firmware"}], "affectedConfiguration": [{"name": "optilinknetwork op-xt71000n", "cpeName": "optilinknetwork:op-xt71000n", "version": "2.2", "operator": "eq"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:optilinknetwork:op-xt71000n:2.2:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}]}, "extraReferences": [{"url": "https://github.com/huzaifahussain98/CVE-2020-23586", "name": "https://github.com/huzaifahussain98/CVE-2020-23586", "refsource": "MISC", "tags": ["Third Party Advisory"]}]}
{}