First published: Mon May 22 2006(Updated: )
Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IpSwitch WhatsUp | =professional_2006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.