1 results (0.001 seconds)

CVSS: 9.8EPSS: 34%CPEs: 2EXPL: 2

cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter. cgi-bin/makecgi-pro en Iomega StorCenter Pro genera sesiones IDs previsibles, que permiten a atacantes remotos secuestrar sesiones activas y obtener privilegios a través de ataques de fuerza bruta al parámetro session_id. The Iomega StorCenter Pro Network Attached Storage device web interface increments sessions IDs, allowing for simple brute force attacks to bypass authentication and gain administrative access. • http://osvdb.org/55586 http://secunia.com/advisories/35666 http://trac.metasploit.com/browser/framework3/trunk/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb?rev=6733 https://exchange.xforce.ibmcloud.com/vulnerabilities/51539 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •