HIGH · 7.1

CVE-2020-29031

An Insecure Direct Object Reference vulnerability exists in the web UI of the GateManager which allows an authenticated attacker to reset the password of any user in its domain or any sub-domain, via ...

Vulnerability Description

An Insecure Direct Object Reference vulnerability exists in the web UI of the GateManager which allows an authenticated attacker to reset the password of any user in its domain or any sub-domain, via escalation of privileges. This issue affects all GateManager versions prior to 9.2c

CVSS Score

7.1

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
SecomeaGatemanager 8250 Firmware< 9.2c
SecomeaGatemanager 8250-
SecomeaGatemanager 4250 Firmware< 9.0i
SecomeaGatemanager 4250-
SecomeaGatemanager 4260 Firmware< 9.0i
SecomeaGatemanager 4260-
SecomeaGatemanager 9250 Firmware< 9.0i
SecomeaGatemanager 9250-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-29031?

CVE-2020-29031 is a vulnerability with a CVSS score of 7.1 (HIGH). An Insecure Direct Object Reference vulnerability exists in the web UI of the GateManager which allows an authenticated attacker to reset the password of any user in its domain or any sub-domain, via ...

How severe is CVE-2020-29031?

CVE-2020-29031 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-29031?

Check the references section above for vendor advisories and patch information. Affected products include: Secomea Gatemanager 8250 Firmware, Secomea Gatemanager 8250, Secomea Gatemanager 4250 Firmware, Secomea Gatemanager 4250, Secomea Gatemanager 4260 Firmware.