#VU53635 Authentication bypass using an alternate path or channel in AmegaView


Published: 2021-05-28

Vulnerability identifier: #VU53635

Vulnerability risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2021-27453

CWE-ID: CWE-288

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
AmegaView
Server applications / Other server solutions

Vendor: Mesa Labs

Description

The vulnerability allows a remote attacker to bypass authentication process.  

The vulnerability exist due to improper implementation of the authentication process when the affected product uses default cookies. A remote attacker can bypass authentication process and gain access to the target system.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AmegaView: 3.0


External links
http://ics-cert.us-cert.gov/advisories/icsa-21-147-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability