First published: Fri Sep 14 2018(Updated: )
LG SuperSign CMS allows authentication bypass because the CAPTCHA requirement is skipped if a captcha:pass cookie is sent, and because the PIN is limited to four digits.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LG SuperSign CMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16286 is a vulnerability that allows authentication bypass in LG SuperSign CMS.
CVE-2018-16286 has a severity level of critical, with a CVSS score of 9.8.
CVE-2018-16286 allows an attacker to bypass authentication in LG SuperSign CMS by skipping the CAPTCHA requirement if a captcha:pass cookie is sent and by exploiting the limitation of only four digits for the PIN.
At the moment, there is no official fix or patch available for CVE-2018-16286. It is recommended to mitigate the vulnerability by implementing additional security measures and monitoring access to the affected LG SuperSign CMS.
More information about CVE-2018-16286 can be found at the following URL: http://mamaquieroserpentester.blogspot.com/2018/09/multiple-vulnerabilities-in-lg.html