The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object reference vulnerability on endpoint and parameter device IDs, which accept arbitrary device IDs without further verification.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01 - Third Party Advisory, US Government Resource |
Information
Published : 2022-07-20 16:15
Updated : 2024-11-21 07:08
NVD link : CVE-2022-34150
Mitre link : CVE-2022-34150
CVE.ORG link : CVE-2022-34150
JSON object : View
Products Affected
micodus
- mv720_firmware
- mv720
CWE
CWE-639
Authorization Bypass Through User-Controlled Key