First published: Wed Oct 13 2021(Updated: )
Draytek VigorConnect 1.6.0-B3 lacks cross-site request forgery protections and does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Draytek VigorConnect | =1.6.0-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Draytek VigorConnect vulnerability is CVE-2021-20126.
The severity of CVE-2021-20126 is high, with a severity value of 8.8.
The affected software for CVE-2021-20126 is Draytek VigorConnect 1.6.0-B3.
CVE-2021-20126 refers to Draytek VigorConnect 1.6.0-B3 lacking cross-site request forgery protections and insufficiently verifying user-submitted requests.
To fix CVE-2021-20126, it is recommended to update to a version of Draytek VigorConnect that includes cross-site request forgery protections and proper request verification.