← Back to CVEs
CVE-2020-8234
CRITICAL9.8
Description
A vulnerability exists in The EdgeMax EdgeSwitch firmware <v1.9.1 where the EdgeSwitch legacy web interface SIDSSL cookie for admin can be guessed, enabling the attacker to obtain high privileges and get a root shell by a Command injection.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published8/21/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
ui:edgemax_firmwareui:ep-s16ui:es-12fui:es-16-150wui:es-16-xgui:es-24-250wui:es-24-500wui:es-24-liteui:es-48-500wui:es-48-750wui:es-48-liteui:es-8-150w
Weaknesses (CWE)
CWE-613CWE-613
References
https://community.ui.com/releases/EdgeMAX-EdgeSwitch-Firmware-v1-9-1-v1-9-1/8a87dfc5-70f5-4055-8d67-570db1f5695c%2C(support@hackerone.com)
https://community.ui.com/releases/Security-advisory-bulletin-014-014/1c32c056-2c64-4e60-ac23-ce7d8f387821%2C(support@hackerone.com)
https://www.ui.com/download/edgemax(support@hackerone.com)
https://community.ui.com/releases/EdgeMAX-EdgeSwitch-Firmware-v1-9-1-v1-9-1/8a87dfc5-70f5-4055-8d67-570db1f5695c%2C(af854a3a-2127-422b-91ae-364da2661108)
https://community.ui.com/releases/Security-advisory-bulletin-014-014/1c32c056-2c64-4e60-ac23-ce7d8f387821%2C(af854a3a-2127-422b-91ae-364da2661108)
https://www.ui.com/download/edgemax(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.