3 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to improper session management in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to perform session fixation on the targeted device. Esta vulnerabilidad se presenta en Tacitine Firewall, en todas las versiones de EN6200-PRIME QUAD-35 y EN6200-PRIME QUAD-100 entre 19.1.1 y 22.20.1 (incluyéndola), debido a una administración inapropiada de la sesión en la interfaz de administración basada en web de Tacitine Firewall. Un atacante remoto no autenticado podría explotar esta vulnerabilidad mediante el envío de una petición http especialmente diseñada en el dispositivo objetivo. • https://tacitine.com/newdownload/CVE-2022-40630.pdf https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2022-0363 • CWE-384: Session Fixation •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to insecure design in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to view sensitive information on the targeted device. Esta vulnerabilidad se presenta en Tacitine Firewall, en todas las versiones de EN6200-PRIME QUAD-35 y EN6200-PRIME QUAD-100 entre 19.1.1 y 22.20.1 (incluyéndola), debido a un diseño no seguro en la interfaz de administración basada en web de Tacitine Firewall. Un atacante remoto no autenticado podría explotar esta vulnerabilidad mediante el envío de una petición http especialmente diseñada en el dispositivo objetivo. • https://tacitine.com/newdownload/CVE-2022-40629.pdf https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2022-0363 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 0

This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to improper control of code generation in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary commands on the targeted device. Esta vulnerabilidad se presenta en Tacitine Firewall, en todas las versiones de EN6200-PRIME QUAD-35 y EN6200-PRIME QUAD-100 entre 19.1.1 y 22.20.1 (incluyéndola), debido a un control inapropiado de la generación de código en la interfaz de administración basada en la web de Tacitine Firewall. Un atacante remoto no autenticado podría explotar esta vulnerabilidad mediante el envío de una petición http especialmente diseñada en el dispositivo objetivo. • https://tacitine.com/newdownload/CVE-2022-40628.pdf https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2022-0363 • CWE-94: Improper Control of Generation of Code ('Code Injection') •