attacker logged in as guest can escalate his privileges by poisoning the
cookie to become administrator.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19782 | The application suffers from a privilege escalation vulnerability. An attacker logged in as guest can escalate his privileges by poisoning the cookie to become administrator. |
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-08T15:41:44.543Z
Reserved: 2024-01-05T22:07:42.986Z
Link: CVE-2024-22186
Updated: 2024-08-01T22:35:34.875Z
Status : Deferred
Published: 2024-04-18T23:15:07.310
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-22186
No data.
OpenCVE Enrichment
No data.
EUVD