An Insecure Direct Object Reference vulnerability exists in the web UI of the GateManager which allows an authenticated attacker to reset the password of any user in its domain or any sub-domain, via escalation of privileges. This issue affects all GateManager versions prior to 9.2c
References
Link | Resource |
---|---|
https://www.secomea.com/support/cybersecurity-advisory/#2920 | Vendor Advisory |
https://www.secomea.com/support/cybersecurity-advisory/#2920 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.secomea.com/support/cybersecurity-advisory/#2920 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 7.1 |
Information
Published : 2021-02-15 16:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-29031
Mitre link : CVE-2020-29031
CVE.ORG link : CVE-2020-29031
JSON object : View
Products Affected
secomea
- gatemanager_8250_firmware
- gatemanager_9250_firmware
- gatemanager_4260_firmware
- gatemanager_4260
- gatemanager_4250_firmware
- gatemanager_9250
- gatemanager_4250
- gatemanager_8250