Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28
References
| Link | Resource |
|---|---|
| https://www.tenable.com/security/research/tra-2023-32 | Exploit Third Party Advisory |
| https://www.tenable.com/security/research/tra-2023-32 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.tenable.com/security/research/tra-2023-32 - Exploit, Third Party Advisory |
22 Sep 2023, 17:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:dlink:d-view_8:2.0.1.28:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Dlink
Dlink d-view 8 |
|
| CWE | CWE-798 | |
| References | (MISC) https://www.tenable.com/security/research/tra-2023-32 - Exploit, Third Party Advisory |
20 Sep 2023, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-09-20 16:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5074
Mitre link : CVE-2023-5074
CVE.ORG link : CVE-2023-5074
JSON object : View
Products Affected
dlink
- d-view_8
CWE
CWE-798
Use of Hard-coded Credentials
