Vulnerability Description
DMA Softlab Radius Manager 4.4.0 assigns the same session cookie to every admin session. The cookie is valid when the admin is logged in, but is invalid (temporarily) during times when the admin is logged out. In other words, the cookie is functionally equivalent to a static password, and thus provides permanent access if stolen.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dmasoftlab | Dma Radius Manager | 4.4.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-SesExploitThird Party AdvisoryVDB Entry
- https://github.com/1d8/publications/tree/main/cve-2021-29012ExploitThird Party Advisory
- https://sourceforge.net/projects/radiusmanager/ProductThird Party Advisory
- http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-SesExploitThird Party AdvisoryVDB Entry
- https://github.com/1d8/publications/tree/main/cve-2021-29012ExploitThird Party Advisory
- https://sourceforge.net/projects/radiusmanager/ProductThird Party Advisory
FAQ
What is CVE-2021-29012?
CVE-2021-29012 is a vulnerability with a CVSS score of 9.8 (CRITICAL). DMA Softlab Radius Manager 4.4.0 assigns the same session cookie to every admin session. The cookie is valid when the admin is logged in, but is invalid (temporarily) during times when the admin is lo...
How severe is CVE-2021-29012?
CVE-2021-29012 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-29012?
Check the references section above for vendor advisories and patch information. Affected products include: Dmasoftlab Dma Radius Manager.