The affected product is vulnerable to an improper authentication vulnerability, which may allow an attacker to impersonate a legitimate user as long as the device keeps the session active, since the attack takes advantage of the cookie header to generate "legitimate" requests.









Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-12T17:54:32.972Z

Reserved: 2023-09-12T23:06:14.688Z

Link: CVE-2023-41089

cve-icon Vulnrichment

Updated: 2024-08-02T18:46:11.906Z

cve-icon NVD

Status : Modified

Published: 2023-10-19T19:15:15.513

Modified: 2024-11-21T08:20:32.500

Link: CVE-2023-41089

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.