First published: Wed May 04 2022(Updated: )
Cross-Site Request Forgery (CSRF) vulnerability in Web UI of Secomea GateManager allows phishing attacker to issue get request in logged in user session.
Credit: VulnerabilityReporting@secomea.com
Affected Software | Affected Version | How to fix |
---|---|---|
Secomea Gatemanager 4250 Firmware | <9.7.622134021 | |
Secomea GateManager | ||
Secomea Gatemanager | <9.7.622134021 | |
Secomea GateManager | ||
Secomea Gatemanager 8250 Firmware | <9.7.622134021 | |
Secomea Gatemanager 8250 Firmware | ||
Secomea GateManager | <9.7.622134021 | |
Secomea GateManager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25778 is a Cross-Site Request Forgery (CSRF) vulnerability in the Web UI of Secomea GateManager.
CVE-2022-25778 allows a phishing attacker to issue a GET request in the logged-in user session of Secomea GateManager.
Secomea GateManager 4250 Firmware versions up to 9.7.622134021, Secomea GateManager 4260 Firmware versions up to 9.7.622134021, Secomea GateManager 8250 Firmware versions up to 9.7.622134021, and Secomea GateManager 9250 Firmware versions up to 9.7.622134021 are affected by CVE-2022-25778.
CVE-2022-25778 has a severity rating of 8.8 (high).
To fix CVE-2022-25778, it is recommended to update Secomea GateManager to a version that is not vulnerable. Please refer to the official Secomea support website for updates.