Description
Seceon aiSIEM before 6.3.2 (build 585) is prone to an unauthenticated account takeover vulnerability in the Forgot Password feature. The lack of correct configuration leads to recovery of the password reset link generated via the password reset functionality, and thus an unauthenticated attacker can set an arbitrary password for any user.
Published: 2021-06-08
Score: 9.8 Critical
EPSS: 1.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-14982 Seceon aiSIEM before 6.3.2 (build 585) is prone to an unauthenticated account takeover vulnerability in the Forgot Password feature. The lack of correct configuration leads to recovery of the password reset link generated via the password reset functionality, and thus an unauthenticated attacker can set an arbitrary password for any user.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T21:40:14.115Z

Reserved: 2021-03-12T00:00:00.000Z

Link: CVE-2021-28293

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-08T18:15:08.277

Modified: 2024-11-21T05:59:25.930

Link: CVE-2021-28293

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses