CVE-2019-5426

In Ubiquiti Networks EdgeSwitch X v1.1.0 and prior, an unauthenticated user can use the "local port forwarding" and "dynamic port forwarding" (SOCKS proxy) functionalities. Remote attackers without credentials can exploit this bug to access local services or forward traffic through the device if SSH is enabled in the system settings.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ui:edgeswitch_x:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:44

Type Values Removed Values Added
References () https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeSwitch-X-software-release-v1-1-1/ba-p/2731137 - Patch, Vendor Advisory () https://community.ubnt.com/t5/EdgeMAX-Updates-Blog/EdgeMAX-EdgeSwitch-X-software-release-v1-1-1/ba-p/2731137 - Patch, Vendor Advisory
References () https://hackerone.com/reports/512958 - Third Party Advisory () https://hackerone.com/reports/512958 - Third Party Advisory

Information

Published : 2019-04-10 18:29

Updated : 2024-11-21 04:44


NVD link : CVE-2019-5426

Mitre link : CVE-2019-5426

CVE.ORG link : CVE-2019-5426


JSON object : View

Products Affected

ui

  • edgeswitch_x
CWE
CWE-287

Improper Authentication