Ubiquiti EdgeMAX devices before 2.0.3 allow remote attackers to cause a denial of service (disk consumption) because *.cache files in /var/run/beaker/container_file/ are created when providing a valid length payload of 249 characters or fewer to the beaker.session.id cookie in a GET header. The attacker can use a long series of unique session IDs.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Ui
Subscribe
|
Ep-r6
Subscribe
Ep-r6 Firmware
Subscribe
Ep-r8
Subscribe
Ep-r8 Firmware
Subscribe
Er-12
Subscribe
Er-12 Firmware
Subscribe
Er-4
Subscribe
Er-4 Firmware
Subscribe
Er-6p
Subscribe
Er-6p Firmware
Subscribe
Er-8
Subscribe
Er-8-xg
Subscribe
Er-8-xg Firmware
Subscribe
Er-8 Firmware
Subscribe
Er-x
Subscribe
Er-x-sfp
Subscribe
Er-x-sfp Firmware
Subscribe
Er-x Firmware
Subscribe
Erlite-3
Subscribe
Erlite-3 Firmware
Subscribe
Erpoe-5
Subscribe
Erpoe-5 Firmware
Subscribe
Erpro-8
Subscribe
Erpro-8 Firmware
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:24:48.289Z
Reserved: 2019-09-25T00:00:00
Link: CVE-2019-16889
No data.
Status : Modified
Published: 2019-09-25T20:15:11.120
Modified: 2024-11-21T04:31:16.817
Link: CVE-2019-16889
No data.
OpenCVE Enrichment
No data.
Weaknesses