Aethon TUG Home Base Server security bypass | CVE-2022-1066
NAME
Aethon TUG Home Base Server security bypass
- Platforms Affected:
Aethon TUG Home Base Server 23
Aethon TUG Home Base Server 22 - Risk Level:
8.2 - Exploitability:
Unproven - Consequences:
Bypass Security
DESCRIPTION
Aethon TUG Home Base Server could allow a remote attacker to bypass security restrictions, caused by missing authorization. An attacker could exploit this vulnerability to add new users with administrative privileges and delete or modify existing users.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: None
- Remediation Level: Official Fix
MITIGATION
Upgrade to the latest version of Aethon TUG Home Base Server software (24 or later), available from the Aethon Web site. See References.
- Reference Link:
https://www.cisa.gov/uscert/ics/advisories/icsa-22-102-05 - Reference Link:
https://aethon.com/
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.