Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43169 | Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application. |
Solution
Socomec reports that MODULYS GP (MOD3GP-SY-120K) is an End-of-Life product. Socomec recommends using MODULYS GP2 (M4-S-XXX) instead. MODULYS GP2 (M4-S-XXX) is not affected by the above vulnerabilities.
Workaround
No workaround given by the vendor.
Tue, 24 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-24T18:13:14.700Z
Reserved: 2023-09-06T15:41:16.528Z
Link: CVE-2023-39446
Updated: 2024-08-02T18:10:20.696Z
Status : Modified
Published: 2023-09-18T21:15:56.117
Modified: 2024-11-21T08:15:26.663
Link: CVE-2023-39446
No data.
OpenCVE Enrichment
No data.
EUVD