Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

dimanche 9 septembre 2018

FURUNO FELCOM 250/FELCOM 500 Password sm_changepassword.cgi weak authentication

A vulnerability, which was classified as critical, has been found in FURUNO FELCOM 250 and FELCOM 500 (the affected version is unknown). Affected by this issue is an unknown function of the file /cgi-bin/sm_changepassword.cgi of the component Password Handler. The manipulation with an unknown input leads to a weak authentication vulnerability (Password Reset). Using CWE to declare the problem leads to CWE-287. Impacted is confidentiality, integrity, and availability.

The weakness was released 09/10/2018. This vulnerability is handled as CVE-2018-16591 since 09/06/2018. No form of authentication is required for exploitation. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 09/11/2018).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Entries connected to this vulnerability are available at 123808.



VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.3

VulDB Base Score: 6.3
VulDB Temp Score: 6.3
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍


Class: Weak authentication / Password Reset (CWE-287)
Local: Yes
Remote: No

Availability: No

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligence

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Actions: 🔍


Recommended: no mitigation known
0-Day Time: 🔒


09/06/2018 CVE assigned
09/10/2018 Advisory disclosed
09/11/2018 VulDB entry created
09/11/2018 VulDB last update


CVE: CVE-2018-16591 (🔒)
See also: 🔒


Created: 09/11/2018
Complete: 🔍

Lien vers l'article source

Auteur: VulDB

Catégories: VulDBNombre de vues: 386


Événements SSI