First published: Mon Oct 23 2017(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in Hexis HawkEye G 3.0.1.4912 allow remote attackers to hijack the authentication of administrators for requests that (1) add arbitrary accounts via the name parameter to interface/rest/accounts/json; turn off the (2) Url matching, (3) DNS Inject, or (4) IP Redirect Sensor in a request to interface/rest/dpi/setEnabled/1; or (5) perform whitelisting of malware MD5 hash IDs via the id parameter to interface/rest/md5-threats/whitelist.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Watchguard Hawkeye G | =3.0.1.4912 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.