Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21586 | Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point. |
Solution
Users and administrators of affected products are advised to contact their Business Partner immediately to update to the latest version.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Wed, 16 Jul 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point. | |
| Title | Weak Session ID Check in the OmniAccess Stellar Web Management Interface | |
| Weaknesses | CWE-384 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CSA
Published:
Updated: 2025-07-16T14:40:58.689Z
Reserved: 2025-06-19T06:04:41.987Z
Link: CVE-2025-52689
Updated: 2025-07-16T14:36:21.423Z
Status : Awaiting Analysis
Published: 2025-07-16T07:15:23.190
Modified: 2025-07-16T15:15:32.020
Link: CVE-2025-52689
No data.
OpenCVE Enrichment
No data.
EUVD