An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross site request forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface to change a user's password. Also this is a systemic issue.
References
Link | Resource |
---|---|
https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Securifi_Almond_plus_sec_issues.pdf | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html | Third Party Advisory VDB Entry |
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2019-06-18 14:15
Updated : 2019-06-21 06:37
NVD link : CVE-2017-8328
Mitre link : CVE-2017-8328
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
securifi
- almond_2015_firmware
- almond_2015
- almond\+
- almond
- almond\+firmware
- almond_firmware