CVE-2020-8170

We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS v6.2.0 and prior TI, XW and XM boards, according to the description below:Multiple end-points with parameters vulnerable to reflected cross site scripting (XSS), allowing attackers to abuse the user' session information and/or account takeover of the admin user.Mitigation:Update to the latest AirMax AirOS firmware version available at the AirMax download page.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*
OR cpe:2.3:h:ui:ag-hp-2g16:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:ag-hp-2g20:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:ag-hp-5g23:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:ag-hp-5g27:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:airgrid_m:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:airgrid_m2:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:airgrid_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:ar:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:ar-hp:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:bm2-ti:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:bm2hp:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:bm5-ti:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:bm5hp:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:is-m5:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:lbem5-23:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:litestation_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:locom2:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:locom5:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:locom9:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:m2:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:m3:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:m365:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:m5:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:m900:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nb-2g18:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nb-5g22:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nb-5g25:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nbe-m2-13:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nbe-m5-16:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nbe-m5-19:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nbm3:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nbm365:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nbm9:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nsm2:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nsm3:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nsm365:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:nsm5:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbe-m2-400:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbe-m5-300:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbe-m5-300-iso:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbe-m5-400:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbe-m5-400-iso:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbe-m5-620:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbm10:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbm365:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:pbm5:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:picom2hp:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:power_ap_n:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:rm2-ti:-:*:*:*:*:*:*:*
cpe:2.3:h:ui:rm5-ti:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://community.ui.com/releases/Security-advisory-bulletin-010-010/36a8448a-7dbf-4d30-bb54-398c44591dd4 - Vendor Advisory () https://community.ui.com/releases/Security-advisory-bulletin-010-010/36a8448a-7dbf-4d30-bb54-398c44591dd4 - Vendor Advisory
References () https://community.ui.com/releases/airMAX-M-v6-3-0/c8d5dec9-4030-4d7e-b23f-6a5b35ed3d83 - Vendor Advisory () https://community.ui.com/releases/airMAX-M-v6-3-0/c8d5dec9-4030-4d7e-b23f-6a5b35ed3d83 - Vendor Advisory
References () https://www.ui.com/download/airmax-m - Release Notes, Third Party Advisory () https://www.ui.com/download/airmax-m - Release Notes, Third Party Advisory

Information

Published : 2020-05-26 16:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-8170

Mitre link : CVE-2020-8170

CVE.ORG link : CVE-2020-8170


JSON object : View

Products Affected

ui

  • m365
  • nb-5g22
  • nbm3
  • pbe-m5-300
  • pbe-m5-300-iso
  • pbm5
  • locom5
  • locom9
  • lbem5-23
  • is-m5
  • m5
  • bm2-ti
  • airgrid_m2
  • airgrid_m5
  • airos
  • locom2
  • nbe-m5-19
  • pbe-m5-400-iso
  • ar
  • ag-hp-2g20
  • m3
  • nb-2g18
  • nsm2
  • nsm3
  • power_ap_n
  • bm5hp
  • nsm365
  • nb-5g25
  • airgrid_m
  • ag-hp-5g27
  • pbe-m2-400
  • litestation_m5
  • nbm365
  • ag-hp-2g16
  • nbe-m2-13
  • pbm365
  • picom2hp
  • rm5-ti
  • bm5-ti
  • bm2hp
  • pbe-m5-620
  • pbe-m5-400
  • ag-hp-5g23
  • m900
  • ar-hp
  • rm2-ti
  • nbe-m5-16
  • nbm9
  • m2
  • pbm10
  • nsm5
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')