Description
The application is vulnerable to an unauthenticated parameter
manipulation that allows an attacker to set the credentials to blank
giving her access to the admin panel. Also vulnerable to account
takeover and arbitrary password change.
Published: 2024-04-18
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-19775 The application is vulnerable to an unauthenticated parameter manipulation that allows an attacker to set the credentials to blank giving her access to the admin panel. Also vulnerable to account takeover and arbitrary password change.
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-01T22:35:34.937Z

Reserved: 2024-01-05T22:07:42.998Z

Link: CVE-2024-22179

cve-icon Vulnrichment

Updated: 2024-08-01T22:35:34.937Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-18T22:15:09.850

Modified: 2024-11-21T08:55:44.090

Link: CVE-2024-22179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses