Description
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities.
No analysis available yet.
Remediation
Vendor Solution
Contact tech support from ECOA.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-28328 | ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-5134-39f74-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T20:16:40.291Z
Reserved: 2021-09-15T00:00:00.000Z
Link: CVE-2021-41298
No data.
Status : Modified
Published: 2021-09-30T11:15:07.813
Modified: 2024-11-21T06:25:59.567
Link: CVE-2021-41298
No data.
OpenCVE Enrichment
No data.
EUVD