First published: Fri Jan 12 2024(Updated: )
An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Netgear Nighthawk AX1800 Firmware | =4.3.7 | |
Netgear Nighthawk AX1800 Firmware | =4.4.6 | |
GL.iNet GL-AX1800 | ||
All of | ||
Any of | ||
gl-inet gl-axt1800 | =4.3.7 | |
gl-inet gl-axt1800 | =4.4.6 | |
GL.iNet GL-AX1800 | ||
All of | ||
Any of | ||
GL.iNet GL-MT3000 Firmware | =4.3.7 | |
GL.iNet GL-MT3000 Firmware | =4.4.6 | |
GL.iNet GL-MT3000 | ||
All of | ||
Any of | ||
GL.iNet GL-MT2500 | =4.3.7 | |
GL.iNet GL-MT2500 | =4.4.6 | |
GL.iNet GL-MT2500 | ||
All of | ||
Any of | ||
GL.iNet GL-MT6000 | =4.3.7 | |
GL.iNet GL-MT6000 | =4.4.6 | |
GL.iNet GL-MT6000 | ||
All of | ||
Any of | ||
GL.iNet GL-MT1300 Firmware | =4.3.7 | |
GL.iNet GL-MT1300 Firmware | =4.4.6 | |
GL.iNet GL-MT1300 | ||
All of | ||
Any of | ||
GL.iNet GL-MT300N-V2 Firmware | =4.3.7 | |
GL.iNet GL-MT300N-V2 Firmware | =4.4.6 | |
gl-inet gl-mt300n-v2 firmware | ||
All of | ||
Any of | ||
GL.iNet GL-AR750 Firmware | =4.3.7 | |
GL.iNet GL-AR750 Firmware | =4.4.6 | |
GL.iNet GL-AR750 Firmware | ||
All of | ||
Any of | ||
GL.iNet GL-AR750 Firmware | =4.3.7 | |
GL.iNet GL-AR750 Firmware | =4.4.6 | |
GL.iNet GL-AR750 Firmware | ||
All of | ||
Any of | ||
GL.iNet GL-AR300M Firmware | =4.3.7 | |
GL.iNet GL-AR300M Firmware | =4.4.6 | |
GL.iNet GL-AR300M Firmware | ||
All of | ||
Any of | ||
GL.iNet GL-B1300 Firmware | =4.3.7 | |
GL.iNet GL-B1300 Firmware | =4.4.6 | |
GL.iNet GL-B1300 Firmware | ||
All of | ||
Any of | ||
GL.iNet GL-A1300 Firmware | =4.3.7 | |
GL.iNet GL-A1300 Firmware | =4.4.6 | |
GL.iNet GL-A1300 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50920 is considered a high severity vulnerability due to the risk of unauthorized access by attackers.
To fix CVE-2023-50920, upgrade your GL.iNet device firmware to version 4.5.0 or later.
CVE-2023-50920 affects GL.iNet devices running firmware versions prior to 4.5.0.
CVE-2023-50920 is an authentication bypass vulnerability allowing attackers to impersonate legitimate users.
Yes, attackers can exploit CVE-2023-50920 remotely by sharing session identifiers between different user sessions.