First published: Thu Feb 13 2014(Updated: )
CA 2E Web Option r8.1.2 accepts a predictable substring of a W2E_SSNID session token in place of the entire token, which allows remote attackers to hijack sessions by changing characters at the end of this substring, as demonstrated by terminating a session via a modified SSNID parameter to web2edoc/close.htm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom 2e Web Option | =r8.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1219 has a critical severity rating due to the potential for session hijacking.
CVE-2014-1219 allows remote attackers to hijack user sessions by exploiting predictable session tokens.
To mitigate CVE-2014-1219, it is recommended to upgrade to a patched version of CA 2E Web Option that addresses this vulnerability.
Exploitation of CVE-2014-1219 can lead to unauthorized access and compromise of user sessions.
Yes, Broadcom has released updates that fix the vulnerability described in CVE-2014-1219.