Overly permissive cross-domain whitelist in HMS Networks Ewon Flexy and Cosy



Published: 2020-09-11
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-16230
CWE-ID CWE-942
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
eWON Flexy
Hardware solutions / Routers & switches, VoIP, GSM, etc

eWON Cosy
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor HMS Networks

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Overly permissive cross-domain whitelist

EUVDB-ID: #VU46657

Risk: Low

CVSSv3.1: 2 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-16230

CWE-ID: CWE-942 - Overly Permissive Cross-domain Whitelist

Exploit availability: No

Description

The vulnerability allows a local user to bypass the CORS protection mechanism.

The vulnerability exists due to incorrect processing of the "Origin" HTTP header that is supplied within HTTP request. A local administrator can supply arbitrary value via the "Origin" HTTP header, bypass implemented CORS protection mechanism and retrieve limited confidential information through sniffing.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

eWON Flexy: before 14.1

eWON Cosy: before 14.1

External links

http://ics-cert.us-cert.gov/advisories/icsa-20-254-03


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###