#VU26512 Improper Authentication in UltraLog Express


Published: 2020-04-01

Vulnerability identifier: #VU26512

Vulnerability risk: Medium

CVSSv3.1: 6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-3920

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
UltraLog Express
Hardware solutions / Other hardware appliances

Vendor: Unisoon

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the UltraLog Express device management interface does not properly perform access authentication in some specific pages/functions. A remote authenticated attacker can bypass authentication process and gain unauthorized access the privileged page to manage accounts through specific system directory.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

UltraLog Express: 1.4.0


External links
http://www.twcert.org.tw/tw/cp-132-3452-937d6-1.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability