First published: Mon Feb 17 2020(Updated: )
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices mishandle session validation, leading to unauthenticated creation, modification, or elimination of users.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microchip Syncserver S100 Firmware | =2.90.70.3 | |
Microchip Syncserver S100 | ||
Microchip Syncserver S200 Firmware | =1.30 | |
Microchip Syncserver S200 | ||
Microchip Syncserver S250 Firmware | =1.25 | |
Microchip Syncserver S250 | ||
Microchip Syncserver S300 Firmware | =2.65.0 | |
Microchip Syncserver S300 | ||
Microchip Syncserver S350 Firmware | =2.80.1 | |
Microchip Syncserver S350 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9034 is a vulnerability that affects Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices.
CVE-2020-9034 has a severity rating of 7.5 (high).
The vulnerability in CVE-2020-9034 is that the affected devices mishandle session validation, leading to unauthenticated creation, modification, or elimination of users.
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices are affected by CVE-2020-9034.
At the moment, there is no specific fix available for CVE-2020-9034. It is recommended to follow best practices for securing the affected devices and monitor for any updates or patches from the vendor.