We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS v6.2.0 and prior TI, XW and XM boards, according to the description below:Multiple end-points with parameters vulnerable to reflected cross site scripting (XSS), allowing attackers to abuse the user' session information and/or account takeover of the admin user.Mitigation:Update to the latest AirMax AirOS firmware version available at the AirMax download page.
References
Link | Resource |
---|---|
https://community.ui.com/releases/airMAX-M-v6-3-0/c8d5dec9-4030-4d7e-b23f-6a5b35ed3d83 | Vendor Advisory |
https://www.ui.com/download/airmax-m | Release Notes Third Party Advisory |
https://community.ui.com/releases/Security-advisory-bulletin-010-010/36a8448a-7dbf-4d30-bb54-398c44591dd4 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-05-26 09:15
Updated : 2020-05-28 13:03
NVD link : CVE-2020-8170
Mitre link : CVE-2020-8170
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
ui
- nsm365
- rm2-ti
- nbm365
- pbe-m5-400-iso
- bm5-ti
- pbm5
- m365
- litestation_m5
- ar
- m2
- bm2hp
- pbe-m5-400
- pbe-m5-300-iso
- ag-hp-5g23
- lbem5-23
- bm2-ti
- nbm3
- airgrid_m
- pbe-m2-400
- nbe-m5-19
- power_ap_n
- pbe-m5-620
- locom5
- nb-5g25
- rm5-ti
- ar-hp
- nsm5
- locom9
- ag-hp-5g27
- nbm9
- pbe-m5-300
- airgrid_m2
- m900
- locom2
- pbm10
- nsm3
- nbe-m2-13
- pbm365
- ag-hp-2g16
- airgrid_m5
- nbe-m5-16
- picom2hp
- m3
- nb-2g18
- nsm2
- nb-5g22
- ag-hp-2g20
- m5
- is-m5
- airos
- bm5hp