cvelist/2023/35xxx/CVE-2023-35794.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2023-06-16 22:00:42 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2023-10-27 21:00:32 +00:00
"ID": "CVE-2023-35794",
"STATE": "PUBLIC"
2023-06-16 22:00:42 +00:00
},
2023-10-27 21:00:32 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2023-06-16 22:00:42 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-10-27 21:00:32 +00:00
"value": "An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.cassianetworks.com/products/iot-access-controller/",
"refsource": "MISC",
"name": "https://www.cassianetworks.com/products/iot-access-controller/"
},
{
"refsource": "MISC",
"name": "https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking",
"url": "https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking"
2024-01-29 21:00:33 +00:00
},
{
"refsource": "MISC",
"name": "https://blog.kscsc.online/cves/202335794/md.html",
"url": "https://blog.kscsc.online/cves/202335794/md.html"
2023-06-16 22:00:42 +00:00
}
]
}
}