CVE-2021-44032
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded "no authentication" method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.
TP-Link Omada SDN Software Controller versiones anteriores a 5.0.15, no comprueba si el método de autenticación especificado en una petición de conexión está permitido. Un atacante puede omitir el proceso de autenticación del portal cautivo al usar el método "no authentication" degradado, y acceder a la red protegida. Por ejemplo, el atacante puede simplemente establecer window.authType=0 en el JavaScript del lado del cliente
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-19 CVE Reserved
- 2022-03-07 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-11-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_CVE-2021-44032_Kevin.md | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.tp-link.com/us/omada-sdn | 2022-07-12 | |
https://www.tp-link.com/us/security | 2022-07-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tp-link Search vendor "Tp-link" | Omada Software Controller Search vendor "Tp-link" for product "Omada Software Controller" | < 5.0.15 Search vendor "Tp-link" for product "Omada Software Controller" and version " < 5.0.15" | windows |
Affected
|