An attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. If two users access the web interface from the same IP they are logged in as the other user.
Advisories

No advisories yet.

Fixes

Solution

The vendor does not provide a patch for this issue to date but an update is planned for the future.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Fri, 13 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Dec 2024 13:45:00 +0000

Type Values Removed Values Added
Description An attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. If two users access the web interface from the same IP they are logged in as the other user.
Title Broken Access Control
Weaknesses CWE-384
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-11-03T21:54:29.638Z

Reserved: 2024-03-05T09:15:40.202Z

Link: CVE-2024-28144

cve-icon Vulnrichment

Updated: 2025-11-03T21:54:29.638Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-12T14:15:22.330

Modified: 2025-11-03T22:16:50.363

Link: CVE-2024-28144

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.