In certain Nedi products, a vulnerability in the web UI of NeDi login & Community login could allow an unauthenticated, remote attacker to affect the integrity of a device via a User Enumeration vulnerability. The vulnerability is due to insecure design, where a difference in forgot password utility could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. This affects NeDi 1.0.7 for OS X 1.0.7 <= and NeDi for Suse 1.0.7 <= and NeDi for FreeBSD 1.0.7 <=.
References
Link | Resource |
---|---|
http://forum.nedi.ch/index.php | Vendor Advisory |
https://www.nedi.ch/ | Vendor Advisory |
https://gist.github.com/UditChavda/2f2effa477a429b485ae7e2dc3bbd04f | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-10-06 11:16
Updated : 2022-10-07 13:11
NVD link : CVE-2022-40895
Mitre link : CVE-2022-40895
JSON object : View
CWE
CWE-203
Observable Discrepancy
Products Affected
nedi
- nedi