Lucene search

K
cve[email protected]CVE-2023-33621
HistoryJun 13, 2023 - 4:15 p.m.

CVE-2023-33621

2023-06-1316:15:13
CWE-294
web.nvd.nist.gov
10
cve-2023-33621
gl.inet
gl-ar750s-ext
firmware
admin authentication token
get request
openvpn
session replay
access logs

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.9 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.7%

GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.

Affected configurations

NVD
Node
gl-inetgl-ar750s_firmwareMatch3.215
AND
gl-inetgl-ar750sMatch-

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.9 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.7%

Related for CVE-2023-33621