Description
In multiple Tecson Tankspion and GOKs SmartBox 4 products the affected application doesn't properly restrict access to an endpoint that is responsible for saving settings, to a unauthenticated user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Upgrade to firmware version > 6.32
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-3896 | In multiple Tecson Tankspion and GOKs SmartBox 4 products the affected application doesn't properly restrict access to an endpoint that is responsible for saving settings, to a unauthenticated user with limited access rights. Based on the lack of adequately implemented access-control rules, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to change the application settings without authenticating at all, which violates originally laid ACL rules. |
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2019-012/ |
|
History
No history.
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T20:22:12.620Z
Reserved: 2019-05-21T00:00:00.000Z
Link: CVE-2019-12254
No data.
Status : Modified
Published: 2022-05-06T18:15:08.397
Modified: 2024-11-21T04:22:29.477
Link: CVE-2019-12254
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD