Vulnerability Description
An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Airties | Air 4920 Firmware | < 2020-08-04 |
| Airties | Air 4920 | - |
| Airties | Air 4921 Firmware | < 2020-08-04 |
| Airties | Air 4921 | - |
| Airties | Air 4971 Firmware | < 2020-08-04 |
| Airties | Air 4971 | - |
Related Weaknesses (CWE)
References
- https://airties.com/airties-information-security-policy/Vendor Advisory
- https://github.com/ProxyStaffy/Airties-CVE-2022-38789/blob/main/DescriptionThird Party Advisory
- https://airties.com/airties-information-security-policy/Vendor Advisory
- https://github.com/ProxyStaffy/Airties-CVE-2022-38789/blob/main/DescriptionThird Party Advisory
FAQ
What is CVE-2022-38789?
CVE-2022-38789 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object ...
How severe is CVE-2022-38789?
CVE-2022-38789 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-38789?
Check the references section above for vendor advisories and patch information. Affected products include: Airties Air 4920 Firmware, Airties Air 4920, Airties Air 4921 Firmware, Airties Air 4921, Airties Air 4971 Firmware.