CVE-2022-40895

In certain Nedi products, a vulnerability in the web UI of NeDi login & Community login could allow an unauthenticated, remote attacker to affect the integrity of a device via a User Enumeration vulnerability. The vulnerability is due to insecure design, where a difference in forgot password utility could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. This affects NeDi 1.0.7 for OS X 1.0.7 <= and NeDi for Suse 1.0.7 <= and NeDi for FreeBSD 1.0.7 <=.
References
Link Resource
http://forum.nedi.ch/index.php Vendor Advisory
https://gist.github.com/UditChavda/2f2effa477a429b485ae7e2dc3bbd04f Exploit Third Party Advisory
https://www.nedi.ch/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nedi:nedi:*:*:*:*:*:freebsd:*:*
cpe:2.3:a:nedi:nedi:*:*:*:*:*:suse:*:*
cpe:2.3:a:nedi:nedi:1.0.7:*:*:*:*:mac_os_x:*:*

History

No history.

Information

Published : 2022-10-06 18:16

Updated : 2024-02-28 19:29


NVD link : CVE-2022-40895

Mitre link : CVE-2022-40895

CVE.ORG link : CVE-2022-40895


JSON object : View

Products Affected

nedi

  • nedi
CWE
CWE-203

Observable Discrepancy