CVE-2022-40895

In certain Nedi products, a vulnerability in the web UI of NeDi login & Community login could allow an unauthenticated, remote attacker to affect the integrity of a device via a User Enumeration vulnerability. The vulnerability is due to insecure design, where a difference in forgot password utility could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. This affects NeDi 1.0.7 for OS X 1.0.7 <= and NeDi for Suse 1.0.7 <= and NeDi for FreeBSD 1.0.7 <=.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nedi:nedi:*:*:*:*:*:freebsd:*:*
cpe:2.3:a:nedi:nedi:*:*:*:*:*:suse:*:*
cpe:2.3:a:nedi:nedi:1.0.7:*:*:*:*:mac_os_x:*:*

History

21 Nov 2024, 07:22

Type Values Removed Values Added
References () http://forum.nedi.ch/index.php - Vendor Advisory () http://forum.nedi.ch/index.php - Vendor Advisory
References () https://gist.github.com/UditChavda/2f2effa477a429b485ae7e2dc3bbd04f - Exploit, Third Party Advisory () https://gist.github.com/UditChavda/2f2effa477a429b485ae7e2dc3bbd04f - Exploit, Third Party Advisory
References () https://www.nedi.ch/ - Vendor Advisory () https://www.nedi.ch/ - Vendor Advisory

Information

Published : 2022-10-06 18:16

Updated : 2024-11-21 07:22


NVD link : CVE-2022-40895

Mitre link : CVE-2022-40895

CVE.ORG link : CVE-2022-40895


JSON object : View

Products Affected

nedi

  • nedi
CWE
CWE-203

Observable Discrepancy