The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-4613 The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support.
Fixes

Solution

i-GEN Solutions has released a new version, opLYNX 2.01.9, that resolves this vulnerability. The new version is installed during logon and automatically applied. Anthony Cicalla has tested the new version and validated that it resolves the vulnerability. To manually obtain the new version, ICS-CERT recommends customers contact i-GEN Solutions customer service.i-GEN’s customer service, http://www.i-gen.com , support@i-gen.com


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00466}

epss

{'score': 0.00492}


Thu, 10 Jul 2025 16:30:00 +0000

Type Values Removed Values Added
Title I-GEN opLYNX Central Authentication Bypass
Weaknesses CWE-592
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-10T16:10:19.366Z

Reserved: 2012-08-28T00:00:00Z

Link: CVE-2012-4688

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-12-31T11:50:27.220

Modified: 2025-07-10T17:15:29.757

Link: CVE-2012-4688

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.