First published: Wed Dec 31 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in Smoothwall Express 3.1 and 3.0 SP3 allow remote attackers to hijack the authentication of administrators for requests that change the (1) admin or (2) dial password via a request to httpd/cgi-bin/changepw.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Smoothwall Smoothwall | =3.0-sp3 | |
Smoothwall Smoothwall | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9431 has a medium severity rating due to its potential to allow remote attackers to hijack administrator authentication.
To fix CVE-2014-9431, update Smoothwall Express to version 3.1 or the latest patch for version 3.0 SP3.
The attack vectors for CVE-2014-9431 include executing cross-site request forgery to change admin or dial passwords.
CVE-2014-9431 affects users of Smoothwall Express versions 3.0 SP3 and 3.1.
Yes, if exploited, CVE-2014-9431 can lead to unauthorized changes in critical settings, increasing the risk of further attacks.