First published: Thu May 02 2019(Updated: )
An issue was discovered in Open XDMoD through 7.5.0. An authentication bypass (account takeover) exists due to a weak password reset mechanism. A brute-force attack against an MD5 rid value requires only 600 guesses in the plausible situation where the attacker knows that the victim has started a password-reset process (pass_reset.php, password_reset.php, XDUser.php) in the past few minutes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Buffalo Open Xdmod | <=7.0.1 | |
Buffalo Open Xdmod | =7.5.0 | |
Buffalo Open Xdmod | =7.5.0-rc1 | |
Buffalo Open Xdmod | =7.5.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16988 is considered to have a high severity due to the potential for authentication bypass and account takeover.
To fix CVE-2018-16988, update Open XDMoD to a version higher than 7.5.0 or apply any available security patches from the vendor.
The implications of CVE-2018-16988 include the risk of unauthorized access to user accounts if the vulnerability is exploited.
Versions of Open XDMoD from 7.0.1 up to 7.5.0 are affected by CVE-2018-16988.
Yes, CVE-2018-16988 can be exploited remotely if an attacker has knowledge of the victim's password reset process.