First published: Wed May 26 2021(Updated: )
In VOS user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after the user successfully logs into the application. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Versa Networks Versa Operating System | <16.1r2s11 | |
Versa Networks Versa Operating System | >=20.2.0<20.2.2 | |
Versa Networks Versa Operating System | >=21.1.0<21.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16495 is classified as a high severity vulnerability due to the potential for session hijacking.
To address CVE-2018-16495, ensure that a new session identifier is issued after user authentication.
CVE-2018-16495 can enable session fixation attacks, allowing an attacker to impersonate a legitimate user.
CVE-2018-16495 affects multiple versions of Versa Networks Versa Operating System up to 20.2.2 and specific 21.1.x versions.
Once exploited, the effects of CVE-2018-16495 may not be easily reversible without user intervention or re-authentication.