The device allows an unauthenticated attacker to bypass authentication
and modify the cookie to reveal hidden pages that allows more critical
operations to the transmitter.
References
Configurations
No configuration.
History
21 Nov 2024, 08:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02 - |
28 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The device allows an unauthenticated attacker to bypass authentication and modify the cookie to reveal hidden pages that allows more critical operations to the transmitter. |
19 Apr 2024, 13:10
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Apr 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-18 23:15
Updated : 2024-11-21 08:55
NVD link : CVE-2024-21872
Mitre link : CVE-2024-21872
CVE.ORG link : CVE-2024-21872
JSON object : View
Products Affected
No product.
CWE
CWE-565
Reliance on Cookies without Validation and Integrity Checking