The cross-site request forgery token in the request may be predictable or easily guessable allowing attackers to craft a malicious request, which could be triggered by a victim unknowingly. In a successful CSRF attack, the attacker could lead the victim user to carry out an action unintentionally.





Advisories
Source ID Title
EUVD EUVD EUVD-2023-42378 The cross-site request forgery token in the request may be predictable or easily guessable allowing attackers to craft a malicious request, which could be triggered by a victim unknowingly. In a successful CSRF attack, the attacker could lead the victim user to carry out an action unintentionally.
Fixes

Solution

No solution given by the vendor.


Workaround

Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities.  The reported cross site request forgery vulnerability was patched in a later WeOS4 version.

History

Thu, 07 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-11-07T20:33:42.806Z

Reserved: 2023-10-12T20:21:27.767Z

Link: CVE-2023-38579

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:56.268Z

cve-icon NVD

Status : Modified

Published: 2024-02-06T22:16:12.910

Modified: 2024-11-21T08:13:52.073

Link: CVE-2023-38579

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses