** DISPUTED ** The administrative web server on the Digital Alert Systems DASDEC EAS device through 2.0-2 and the Monroe Electronics R189 One-Net EAS device through 2.0-2 uses predictable session ID values, which makes it easier for remote attackers to hijack sessions by sniffing the network. NOTE: VU#662676 states "Monroe Electronics could not reproduce this finding."
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/AAMN-98MUK2 | US Government Resource |
http://www.kb.cert.org/vuls/id/AAMN-98MU7H | US Government Resource |
http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf | Vendor Advisory |
http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf | Vendor Advisory |
http://www.kb.cert.org/vuls/id/662676 | US Government Resource |
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-06-30 12:28
Updated : 2013-06-30 21:00
NVD link : CVE-2013-4732
Mitre link : CVE-2013-4732
JSON object : View
CWE
CWE-255
Credentials Management Errors
Products Affected
monroe_electronics
- r189_one-net_eas
digital_alert_systems
- dasdec_eas