Vulnerability Details : CVE-2022-29593
relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
Products affected by CVE-2022-29593
- cpe:2.3:o:dingtian-tech:dt-r004_firmware:3.1.276a:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-29593
0.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-29593
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2022-29593
-
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-29593
-
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/
CVE-2022-29593- Authentication Bypass by Capture Replay (Dingtian-DT-R002) | TrustwaveExploit;Third Party Advisory
-
http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html
Dingtian-DT-R002 3.1.276A Authentication Bypass ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
Security Advisories | TrustwaveExploit;Third Party Advisory
Jump to