First published: Fri Aug 21 2020(Updated: )
A vulnerability exists in The EdgeMax EdgeSwitch firmware <v1.9.1 where the EdgeSwitch legacy web interface SIDSSL cookie for admin can be guessed, enabling the attacker to obtain high privileges and get a root shell by a Command injection.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ui Edgemax Firmware | <1.9.1 | |
Ui Ep-s16 | ||
Ui Es-12f | ||
Ui Es-16-150w | ||
Ui Es-16-xg | ||
Ui Es-24-250w | ||
Ui Es-24-500w | ||
Ui Es-24-lite | ||
Ui Es-48-500w | ||
Ui Es-48-750w | ||
Ui Es-48-lite | ||
Ui Es-8-150w |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-8234.
The severity rating of CVE-2020-8234 is critical with a severity value of 9.8.
An attacker can exploit CVE-2020-8234 by guessing the EdgeSwitch legacy web interface SIDSSL cookie for admin, enabling them to obtain high privileges and execute a command injection to gain a root shell.
The affected software for CVE-2020-8234 is The EdgeMax EdgeSwitch firmware prior to version 1.9.1.
To fix the CVE-2020-8234 vulnerability, update The EdgeMax EdgeSwitch firmware to version 1.9.1 or newer.