Description
An authentication bypass vulnerability exists in the requestHandlers.js verifyToken functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An attacker can send a network request to trigger this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26955 | An authentication bypass vulnerability exists in the requestHandlers.js verifyToken functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An attacker can send a network request to trigger this vulnerability. |
References
History
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-03-05T18:54:30.930Z
Reserved: 2023-01-20T17:32:00.545Z
Link: CVE-2023-22844
No data.
Status : Modified
Published: 2023-07-06T15:15:11.270
Modified: 2024-11-21T07:45:30.557
Link: CVE-2023-22844
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD