Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2023-32 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2023-32 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2023-32 - Exploit, Third Party Advisory |
22 Sep 2023, 17:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dlink:d-view_8:2.0.1.28:*:*:*:*:*:*:* | |
CWE | CWE-798 | |
References | (MISC) https://www.tenable.com/security/research/tra-2023-32 - Exploit, Third Party Advisory | |
First Time |
Dlink d-view 8
Dlink |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
20 Sep 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-20 16:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5074
Mitre link : CVE-2023-5074
CVE.ORG link : CVE-2023-5074
JSON object : View
Products Affected
dlink
- d-view_8
CWE
CWE-798
Use of Hard-coded Credentials