Unknown
CVE-2023-50920
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-50920
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- gl-a1300 firmware 4.3.7,
- gl-a1300 firmware 4.4.6,
- gl-ar300m firmware 4.3.7,
- gl-ar300m firmware 4.4.6,
- gl-ar750 firmware 4.3.7,
- gl-ar750 firmware 4.4.6,
- gl-ar750s firmware 4.3.7,
- gl-ar750s firmware 4.4.6,
- gl-ax1800 firmware 4.3.7,
- gl-ax1800 firmware 4.4.6,
- gl-axt1800 firmware 4.3.7,
- gl-axt1800 firmware 4.4.6,
- gl-b1300 firmware 4.3.7,
- gl-b1300 firmware 4.4.6,
- gl-mt1300 firmware 4.3.7,
- gl-mt1300 firmware 4.4.6,
- gl-mt2500 firmware 4.3.7,
- gl-mt2500 firmware 4.4.6,
- gl-mt3000 firmware 4.3.7,
- gl-mt3000 firmware 4.4.6,
- gl-mt300n-v2 firmware 4.3.7,
- gl-mt300n-v2 firmware 4.4.6,
- gl-mt6000 firmware 4.3.7,
- gl-mt6000 firmware 4.4.6
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: