Description
Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
No analysis available yet.
Remediation
Vendor Solution
Single Connect should be updated to the latest version provided by the vendor.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31598 | Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. |
References
| Link | Providers |
|---|---|
| https://www.usom.gov.tr/bildirim/tr-22-0093 |
|
History
Mon, 16 Sep 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. | Single Connect does not perform an authorization check when using the "sc-diagnostic-ui" module. A remote attacker could exploit this vulnerability to access the device information page. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. |
Status: PUBLISHED
Assigner: TR-CERT
Published:
Updated: 2024-09-16T18:48:33.569Z
Reserved: 2021-12-10T00:00:00.000Z
Link: CVE-2021-44794
No data.
Status : Modified
Published: 2022-01-27T13:15:07.953
Modified: 2024-11-21T06:31:33.993
Link: CVE-2021-44794
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD