Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 uses the ecos_pw cookie for authentication, which contains Base64-encoded credential data combined with a static suffix. Because the encoding is reversible and lacks integrity protection, an attacker can reconstruct or forge a valid cookie value without proper authentication. This allows unauthorized administrative access to protected endpoints.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
29 Apr 2026, 17:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://nexxt-connectivity-frontend.s3.amazonaws.com/media/docs/Nebula300+_v12.01.01.37.zip - Product | |
| References | () https://www.nexxtsolutions.com/connectivity/internal-products/ARN02304U6/ - Product | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Nexxtsolutions nebula300plus Firmware
Nexxtsolutions Nexxtsolutions nebula300plus |
|
| CPE | cpe:2.3:o:nexxtsolutions:nebula300plus_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:nexxtsolutions:nebula300plus:-:*:*:*:*:*:*:* |
26 Mar 2026, 11:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| Summary | (en) Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 uses the ecos_pw cookie for authentication, which contains Base64-encoded credential data combined with a static suffix. Because the encoding is reversible and lacks integrity protection, an attacker can reconstruct or forge a valid cookie value without proper authentication. This allows unauthorized administrative access to protected endpoints. |
23 Mar 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 13:16
Updated : 2026-04-29 17:45
NVD link : CVE-2026-31848
Mitre link : CVE-2026-31848
CVE.ORG link : CVE-2026-31848
JSON object : View
Products Affected
nexxtsolutions
- nebula300plus
- nebula300plus_firmware
CWE
CWE-312
Cleartext Storage of Sensitive Information
