Lucene search

K
vulnrichmentCERT-InVULNRICHMENT:CVE-2024-41685
HistoryJul 26, 2024 - 11:41 a.m.

CVE-2024-41685 Cookie Without HTTPOnly Flag Set Vulnerability

2024-07-2611:41:53
CWE-1004
CERT-In
github.com
3
syrotech router
httponly flag
session cookies
vulnerability
remote access
sensitive information
cve-2024-41685

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

ACTIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

37.6%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to missing HTTPOnly flag for the session cookies associated with the router’s web management interface. An attacker with remote access could exploit this by intercepting transmission within an HTTP session on the vulnerable system.

Successful exploitation of this vulnerability could allow the attacker to capture cookies and obtain sensitive information on the targeted system.

CNA Affected

[
  {
    "vendor": "SyroTech",
    "product": "SyroTech SY-GPON-1110-WDONT router",
    "versions": [
      {
        "status": "affected",
        "version": "3.1.02-231102"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*"
    ],
    "vendor": "syrotech",
    "product": "sy-gpon-1110-wdont_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "3.1.02-231102"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

ACTIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

37.6%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-41685