5 results (0.011 seconds)

CVSS: 6.8EPSS: 2%CPEs: 17EXPL: 4

Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa_users_local_db_add.html in the management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, and 6860 with firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, and 8.1.1.R01 allows remote attackers to hijack the authentication of administrators for requests that create users via a crafted request. Vulnerabilidad de CSRF en sec/content/sec_asa_users_local_db_add.html en la interfaz de gestión en Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, y 6860 con firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, y 8.1.1.R01 permite a atacantes remotos secuestrar la autenticación de administradores para solicitudes que crean usuarios a través de una solicitud manipulada. During a penetration test, RedTeam Pentesting discovered a vulnerability in the management web interface of an Alcatel-Lucent OmniSwitch 6450. The management web interface has no protection against cross-site request forgery attacks. This allows specially crafted web pages to change the switch configuration and create users, if an administrator accesses the website while being authenticated in the management web interface. • https://www.exploit-db.com/exploits/37261 http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html http://seclists.org/fulldisclosure/2015/Jun/23 http://www.securityfocus.com/archive/1/535732/100/0/threaded http://www.securityfocus.com/bid/75121 http://www.securitytracker.com/id/1032544 https://www.redteam-pentesting.de/advisories/rt-sa-2015-004 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.3EPSS: 1%CPEs: 10EXPL: 3

The management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, and 6855 with firmware before 6.6.4.309.R01 and 6.6.5.x before 6.6.5.80.R02 generates weak session identifiers, which allows remote attackers to hijack arbitrary sessions via a brute force attack. La gestión de la interfaz web en Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400 y 6855 con firmware en versiones anteriores a 6.6.4.309.R01 y 6.6.5.x en versiones anteriores a 6.6.5.80.R02 genera identificadores de sesión débiles, lo que permite a atacantes remotos secuestrar sesiones arbitrarias a través de un ataque de fuerza bruta. During a penetration test, RedTeam Pentesting discovered a vulnerability in the management web interface of an Alcatel-Lucent OmniSwitch 6450. This interface uses easily guessable session IDs, which allows attackers to authenticate as a currently logged-in user and perform administrative tasks. • http://packetstormsecurity.com/files/132235/Alcatel-Lucent-OmniSwitch-Web-Interface-Weak-Session-ID.html http://seclists.org/fulldisclosure/2015/Jun/22 http://www.securityfocus.com/archive/1/535731/100/0/threaded http://www.securityfocus.com/bid/75125 https://www.redteam-pentesting.de/en/advisories/rt-sa-2015-003/-alcatel-lucent-omniswitch-web-interface-weak-session-id • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 14%CPEs: 10EXPL: 0

Stack-based buffer overflow in the Agranet-Emweb embedded management web server in Alcatel OmniSwitch OS7000, OS6600, OS6800, OS6850, and OS9000 Series devices with AoS 5.1 before 5.1.6.463.R02, 5.4 before 5.4.1.429.R01, 6.1.3 before 6.1.3.965.R01, 6.1.5 before 6.1.5.595.R01, and 6.3 before 6.3.1.966.R01 allows remote attackers to execute arbitrary code via a long Session cookie. Desbordamiento de búfer basado en pila en el servidor web de gestión embebido Agranet-Emweb de Alcatel OmniSwitch dispositivos OS7000, OS6600, OS6800, OS6850, y OS9000 Series con AoS 5.1 versiones anteriores a v5.1.6.463.R02, 5.4 versiones anteriores a v5.4.1.429.R01, 6.1.3 versiones anteriores a v6.1.3.965.R01, 6.1.5 versiones anteriores a v6.1.5.595.R01, y 6.3 versiones anteriores a v6.3.1.966.R01 permite a atacantes remotos ejecutar código de su elección a través de una cookie Session. • http://secunia.com/advisories/31435 http://securityreason.com/securityalert/4347 http://www.layereddefense.com/alcatel12aug.html http://www.securityfocus.com/archive/1/495343/100/0/threaded http://www.securityfocus.com/bid/30652 http://www.securitytracker.com/id?1020657 http://www.vupen.com/english/advisories/2008/2346 http://www1.alcatel-lucent.com/psirt/statements/2008002/OmniSwitch.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/44400 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled. • http://secunia.com/advisories/10981 http://securitytracker.com/id?1009211 http://www.osvdb.org/4064 http://www.securityfocus.com/archive/1/355134 http://www.securityfocus.com/bid/9745 https://exchange.xforce.ibmcloud.com/vulnerabilities/15318 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time. • http://marc.info/?l=bugtraq&m=92299263017061&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/2064 •