Mesa Labs AmegaView Versions 3.0 uses default cookies that could be set to bypass authentication to the web application, which may allow an attacker to gain access.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-14207 | Mesa Labs AmegaView Versions 3.0 uses default cookies that could be set to bypass authentication to the web application, which may allow an attacker to gain access. |
Fixes
Solution
No solution given by the vendor.
Workaround
MesaLabs has scheduled AmegaView for end-of-life at the end of 2021. Due to this discontinued service, MesaLabs does not plan to release an update to address these vulnerabilities. MesaLabs recommends users upgrade to the newer ViewPoint software that is compatible with AmegaView hardware.
References
| Link | Providers |
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-147-03 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-17T02:58:08.318Z
Reserved: 2021-02-19T00:00:00
Link: CVE-2021-27453
No data.
Status : Modified
Published: 2021-12-21T18:15:07.957
Modified: 2024-11-21T05:58:01.173
Link: CVE-2021-27453
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD