Vulnerability Details : CVE-2018-16495
In VOS user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after the user successfully logs into the application. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with.
Products affected by CVE-2018-16495
- cpe:2.3:o:versa-networks:versa_operating_system:*:*:*:*:*:*:*:*
- cpe:2.3:o:versa-networks:versa_operating_system:*:*:*:*:*:*:*:*
- cpe:2.3:o:versa-networks:versa_operating_system:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-16495
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-16495
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-16495
-
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2018-16495
-
https://hackerone.com/reports/1168192
#1168192 Session Fixation ExposureThird Party Advisory
Jump to