An authentication bypass vulnerability exists in the web interface /action/factory* functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP header can lead to authentication bypass. An attacker can send an HTTP request to trigger this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2022-1554 | Exploit Third Party Advisory | 
| https://talosintelligence.com/vulnerability_reports/TALOS-2022-1554 | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 06:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1554 - Exploit, Third Party Advisory | 
Information
                Published : 2022-10-25 17:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29477
Mitre link : CVE-2022-29477
CVE.ORG link : CVE-2022-29477
JSON object : View
Products Affected
                goabode
- iota_all-in-one_security_kit_firmware
 - iota_all-in-one_security_kit
 
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
