- Description
- This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to improper session management in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to perform session fixation on the targeted device.
- Source
- vdisclose@cert-in.org.in
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tacitine:en6200-prime_quad-35_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6E36CCE1-EE57-4509-A5EA-A661AB0D28BE",
"versionEndExcluding": "22.21.2",
"versionStartIncluding": "19.1.1"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tacitine:en6200-prime_quad-35:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "83F89827-7182-4C0F-8AF9-F93FECCA4DEC"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tacitine:en6200-prime_quad-100_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4EDF36CA-FC59-4CB9-B562-5E6EB2102319",
"versionEndExcluding": "22.21.2",
"versionStartIncluding": "19.1.1"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tacitine:en6200-prime_quad-100:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "2071D6CD-7708-46EC-9B09-F0BC9A1626C9"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]