First published: Tue Oct 25 2022(Updated: )
An authentication bypass vulnerability exists in the web interface /action/factory* functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP header can lead to authentication bypass. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9z | |
Goabode Iota All-in-one Security Kit | ||
Goabode Iota All-in-one Security Kit Firmware | =6.9x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-29477.
The severity of CVE-2022-29477 is critical with a CVSS score of 9.8.
The affected software is Goabode Iota All-in-one Security Kit Firmware versions 6.9x and 6.9Z.
The vulnerability manifests as an authentication bypass in the web interface /action/factory* functionality of the affected software.
The vulnerability can be exploited by sending a specially-crafted HTTP header to trigger an authentication bypass.