Description
The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support.
Published: 2012-12-31
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

i-GEN Solutions has released a new version, opLYNX 2.01.9, that resolves this vulnerability. The new version is installed during logon and automatically applied. Anthony Cicalla has tested the new version and validated that it resolves the vulnerability. To manually obtain the new version, ICS-CERT recommends customers contact i-GEN Solutions customer service.i-GEN’s customer service, http://www.i-gen.com , support@i-gen.com

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2012-4613 The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support.
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00466}

epss

{'score': 0.00492}


Thu, 10 Jul 2025 16:30:00 +0000

Type Values Removed Values Added
Title I-GEN opLYNX Central Authentication Bypass
Weaknesses CWE-592
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-10T16:10:19.366Z

Reserved: 2012-08-28T00:00:00.000Z

Link: CVE-2012-4688

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-12-31T11:50:27.220

Modified: 2025-07-10T17:15:29.757

Link: CVE-2012-4688

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses