First published: Thu Jul 06 2023(Updated: )
A sql injection vulnerability exists in the requestHandlers.js LoginAuth functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to authentication bypass. An attacker can send a malicious packet to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight Milesightvpn | =2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22319 is a SQL injection vulnerability that exists in the requestHandlers.js LoginAuth functionality of Milesight VPN v2.0.2.
CVE-2023-22319 allows for authentication bypass in Milesight VPN v2.0.2 through a specially-crafted network request that triggers a SQL injection vulnerability.
CVE-2023-22319 has a severity rating of 9.8 (critical).
An attacker can exploit CVE-2023-22319 by sending a malicious packet to the affected system, triggering the SQL injection vulnerability and bypassing authentication.
At the moment, there is no information available regarding a fix or patch for CVE-2023-22319. It is recommended to take precautionary measures, such as implementing strong network security controls and monitoring for any suspicious activity.