An authentication bypass vulnerability exists in the Authentication functionality of Weston Embedded uC-FTPs v 1.98.00. A specially crafted set of network packets can lead to authentication bypass and denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
References
Link | Resource |
---|---|
https://github.com/weston-embedded/uC-FTPs/pull/1 | Patch |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680 | Exploit Third Party Advisory |
https://github.com/weston-embedded/uC-FTPs/pull/1 | Patch |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1680 |
Configurations
History
21 Nov 2024, 07:24
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://github.com/weston-embedded/uC-FTPs/pull/1 - Patch | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
Information
Published : 2023-05-10 16:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-41985
Mitre link : CVE-2022-41985
CVE.ORG link : CVE-2022-41985
JSON object : View
Products Affected
weston-embedded
- uc-ftps