A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully.
References
Configurations
History
21 Nov 2024, 08:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html - Vendor Advisory |
22 Aug 2023, 16:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:* | |
CWE | NVD-CWE-Other | |
References | (MISC) https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Cyberpower powerpanel Server
Cyberpower |
14 Aug 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-14 05:15
Updated : 2024-11-21 08:16
NVD link : CVE-2023-3266
Mitre link : CVE-2023-3266
CVE.ORG link : CVE-2023-3266
JSON object : View
Products Affected
cyberpower
- powerpanel_server
CWE