Vulnerability Description
The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dasanzhone | Znid 2426A Firmware | < s3.0.501 |
| Dasanzhone | Znid 2426A | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-DiExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2015/Oct/57ExploitMailing ListThird Party Advisory
- https://www.exploit-db.com/exploits/38453/ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-DiExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2015/Oct/57ExploitMailing ListThird Party Advisory
- https://www.exploit-db.com/exploits/38453/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2014-8356?
CVE-2014-8356 is a vulnerability with a CVSS score of 8.8 (HIGH). The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct...
How severe is CVE-2014-8356?
CVE-2014-8356 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8356?
Check the references section above for vendor advisories and patch information. Affected products include: Dasanzhone Znid 2426A Firmware, Dasanzhone Znid 2426A.