Some access control products are vulnerable to a session...
High severity
Unreviewed
Published
Jun 15, 2023
to the GitHub Advisory Database
•
Updated Apr 4, 2024
Description
Published by the National Vulnerability Database
Jun 15, 2023
Published to the GitHub Advisory Database
Jun 15, 2023
Last updated
Apr 4, 2024
Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.
References