Multiple vulnerabilities in Weintek Weincloud



Published: 2023-07-19
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2023-35134
CVE-2023-37362
CVE-2023-32657
CVE-2023-34429
CWE-ID CWE-640
CWE-287
CWE-307
CWE-237
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Weincloud ​Account API
Server applications / Other server solutions

Vendor Weintek

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Weak Password Recovery Mechanism for Forgotten Password

EUVDB-ID: #VU78353

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-35134

CWE-ID: CWE-640 - Weak password recovery mechanism

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a weak password recovery mechanism for forgotten password. A remote attacker can reset a password with the corresponding account’s JWT token only.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Weincloud ​Account API: 0.13.6

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-199-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Authentication

EUVDB-ID: #VU78354

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-37362

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote user to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote administrator can abuse the registration functionality to login with testing credentials to the official website.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Weincloud ​Account API: 0.13.6

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-199-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper Restriction of Excessive Authentication Attempts

EUVDB-ID: #VU78355

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-32657

CWE-ID: CWE-307 - Improper Restriction of Excessive Authentication Attempts

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the number of login attempts is not limited. A remote attacker can perform a brute-force attack on credentials with authentication hints from error message responses.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Weincloud ​Account API: 0.13.6

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-199-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper Handling of Structural Elements

EUVDB-ID: #VU78356

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-34429

CWE-ID: CWE-237 - Improper Handling of Structural Elements

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of structural elements. A remote attacker can send a forged JWT token and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Weincloud ​Account API: 0.13.6

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-199-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###