The cross-site request forgery token in the request may be predictable or easily guessable allowing attackers to craft a malicious request, which could be triggered by a victim unknowingly. In a successful CSRF attack, the attacker could lead the victim user to carry out an action unintentionally.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42378 | The cross-site request forgery token in the request may be predictable or easily guessable allowing attackers to craft a malicious request, which could be triggered by a victim unknowingly. In a successful CSRF attack, the attacker could lead the victim user to carry out an action unintentionally. |
Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities. The reported cross site request forgery vulnerability was patched in a later WeOS4 version.
Thu, 07 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-11-07T20:33:42.806Z
Reserved: 2023-10-12T20:21:27.767Z
Link: CVE-2023-38579
Updated: 2024-08-02T17:46:56.268Z
Status : Modified
Published: 2024-02-06T22:16:12.910
Modified: 2024-11-21T08:13:52.073
Link: CVE-2023-38579
No data.
OpenCVE Enrichment
No data.
EUVD