Lucene search

K
cvelistCERT-InCVELIST:CVE-2022-40630
HistorySep 21, 2022 - 12:00 a.m.

CVE-2022-40630 Improper Session Management Vulnerability in Tacitine Firewall

2022-09-2100:00:00
CWE-384
CERT-In
www.cve.org
vulnerability
tacitine firewall
session management
remote attacker
web-based interface

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

9.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.4%

This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to improper session management in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to perform session fixation on the targeted device.

CNA Affected

[
  {
    "product": "Firewall",
    "vendor": "Tacitine",
    "versions": [
      {
        "lessThan": "EN6200-PRIME QUAD-35*",
        "status": "affected",
        "version": "19.1.1",
        "versionType": "custom"
      },
      {
        "lessThan": "EN6200-PRIME QUAD-100*",
        "status": "affected",
        "version": "19.1.1",
        "versionType": "custom"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

9.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.4%

Related for CVELIST:CVE-2022-40630