7.4 High
AI Score
Confidence
Low
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.013 Low
EPSS
Percentile
85.6%
The management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, and 6855 with firmware before 6.6.4.309.R01 and 6.6.5.x before 6.6.5.80.R02 generates weak session identifiers, which allows remote attackers to hijack arbitrary sessions via a brute force attack.
CPE | Name | Operator | Version |
---|---|---|---|
omniswitch_firmware | eq | <= 6.4.5.r2 | |
omniswitch_firmware | eq | <= 6.4.6.r1 | |
omniswitch_firmware | eq | <= 6.6.4.r1 | |
omniswitch_firmware | eq | <= 6.6.5.r2 |
packetstormsecurity.com/files/132235/Alcatel-Lucent-OmniSwitch-Web-Interface-Weak-Session-ID.html
seclists.org/fulldisclosure/2015/Jun/22
www.securityfocus.com/archive/1/535731/100/0/threaded
www.securityfocus.com/bid/75125
www.redteam-pentesting.de/en/advisories/rt-sa-2015-003/-alcatel-lucent-omniswitch-web-interface-weak-session-id