An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross site request forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface to change a user's password. Also this is a systemic issue.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html | Third Party Advisory VDB Entry |
https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Securifi_Almond_plus_sec_issues.pdf | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2019-06-18 21:15
Updated : 2024-02-04 20:20
NVD link : CVE-2017-8328
Mitre link : CVE-2017-8328
CVE.ORG link : CVE-2017-8328
JSON object : View
Products Affected
securifi
- almond_2015_firmware
- almond\+firmware
- almond
- almond_firmware
- almond\+
- almond_2015
CWE
CWE-352
Cross-Site Request Forgery (CSRF)