![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.808238 |
Category: | Web application abuses |
Title: | EdgeCore ES3526XA Manager Multiple Vulnerabilities |
Summary: | EdgeCore ES3526XA Manager is prone to multiple vulnerabilities. |
Description: | Summary: EdgeCore ES3526XA Manager is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws are due to: - No CSRF Token is generated per page and / or per (sensitive) function - An improper access control mechanism so that any functions can be performed by directly calling the function URL (GET/POST) without any authentication - It is possible to login with default credential admin:admin or guest:guest, and mandatory password change is not enforced by the application Vulnerability Impact: Successful exploitation will allow remote attackers silent execution of unauthorized actions on the device such as password change, configuration parameter changes, to bypass authentication and to perform any administrative functions such as add, update, delete users. Affected Software/OS: EdgeCore - Layer2+ Fast Ethernet Standalone Switch ES3526XA Manager. Please see the referenced link for the affected switch information. Solution: No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. CVSS Score: 8.5 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:P/A:N |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |