Vulnerability identifier: #VU95164
Vulnerability risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-425
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
VAR1200-H
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAR1200-L
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAR600-H
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAP11AC
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAP11G-500S
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VBG1200
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAP11S-5G
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAP11S
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAR11N-300
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAP11G-300
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAP11N-300
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAP11G
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VAP11G-500
Hardware solutions /
Routers & switches, VoIP, GSM, etc
VGA-1000
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Vonets
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper authentication. A remote attacker can send a specially crafted direct request when another user has an active session and bypass authentication.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
VAR1200-H: 3.3.23.6.9
VAR1200-L: 3.3.23.6.9
VAR600-H: 3.3.23.6.9
VAP11AC: 3.3.23.6.9
VAP11G-500S: 3.3.23.6.9
VBG1200: 3.3.23.6.9
VAP11S-5G: 3.3.23.6.9
VAP11S: 3.3.23.6.9
VAR11N-300: 3.3.23.6.9
VAP11G-300: 3.3.23.6.9
VAP11N-300: 3.3.23.6.9
VAP11G: 3.3.23.6.9
VAP11G-500: 3.3.23.6.9
VGA-1000: 3.3.23.6.9
External links
http://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.