Seceon aiSIEM before 6.3.2 (build 585) is prone to an unauthenticated account takeover vulnerability in the Forgot Password feature. The lack of correct configuration leads to recovery of the password reset link generated via the password reset functionality, and thus an unauthenticated attacker can set an arbitrary password for any user.
References
Link | Resource |
---|---|
https://0xdb9.in/2021/06/07/cve-2021-28293.html | Exploit Third Party Advisory |
https://www.seceon.com/advanced-siem-aisiem | Product Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-06-08 18:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-28293
Mitre link : CVE-2021-28293
CVE.ORG link : CVE-2021-28293
JSON object : View
Products Affected
seceon
- aisiem
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password