HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
References
Link | Resource |
---|---|
https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf | Mitigation Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 | Third Party Advisory VDB Entry |
Information
Published : 2021-03-24 09:15
Updated : 2021-03-26 14:21
NVD link : CVE-2020-36283
Mitre link : CVE-2020-36283
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
hidglobal
- omnikey_5127_firmware
- omnikey_5427
- omnikey_5427_firmware
- omnikey_5127