An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication can occur under the /api/v1/vdeskintegration/challenge endpoint. Because only the client-side verifies whether a check was successful, an attacker can modify the response, and fool the application into concluding that the TOTP was correct.
References
Link | Resource |
---|---|
https://www.gruppotim.it/it/footer/red-team.html | Exploit Third Party Advisory |
https://www.gruppotim.it/it/footer/red-team.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.gruppotim.it/it/footer/red-team.html - Exploit, Third Party Advisory |
19 Apr 2023, 19:28
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.gruppotim.it/it/footer/red-team.html - Exploit, Third Party Advisory | |
CWE | CWE-287 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Liveboxcloud vdesk
Liveboxcloud |
|
CPE | cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:* |
14 Apr 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-14 14:15
Updated : 2025-02-07 17:15
NVD link : CVE-2022-45173
Mitre link : CVE-2022-45173
CVE.ORG link : CVE-2022-45173
JSON object : View
Products Affected
liveboxcloud
- vdesk
CWE
CWE-287
Improper Authentication