The administrative web server on the Digital Alert Systems DASDEC EAS device through 2.0-2 and the Monroe Electronics R189 One-Net EAS device through 2.0-2 uses predictable session ID values, which makes it easier for remote attackers to hijack sessions by sniffing the network. NOTE: VU#662676 states "Monroe Electronics could not reproduce this finding.
References
Link | Resource |
---|---|
http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf | Vendor Advisory |
http://www.kb.cert.org/vuls/id/662676 | US Government Resource |
http://www.kb.cert.org/vuls/id/AAMN-98MU7H | US Government Resource |
http://www.kb.cert.org/vuls/id/AAMN-98MUK2 | US Government Resource |
http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2013-06-30 19:28
Updated : 2024-05-17 00:56
NVD link : CVE-2013-4732
Mitre link : CVE-2013-4732
CVE.ORG link : CVE-2013-4732
JSON object : View
Products Affected
digital_alert_systems
- dasdec_eas
monroe_electronics
- r189_one-net_eas
CWE
CWE-255
Credentials Management Errors