This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the vulnerable device.
Successful exploitation of this vulnerability could allow remote attacker to gain unauthorized access and take complete control of the targeted device.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Matrixcomsec
Matrixcomsec cosec Vega Faxq Matrixcomsec cosec Vega Faxq Firmware |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:h:matrixcomsec:cosec_vega_faxq:-:*:*:*:*:*:*:* cpe:2.3:o:matrixcomsec:cosec_vega_faxq_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Matrixcomsec
Matrixcomsec cosec Vega Faxq Matrixcomsec cosec Vega Faxq Firmware |
|
Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Matrix Comsec
Matrix Comsec matrix Door Controller Cosec Vega Faxq Firmware |
|
CPEs | cpe:2.3:o:matrix_comsec:matrix_door_controller_cosec_vega_faxq_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Matrix Comsec
Matrix Comsec matrix Door Controller Cosec Vega Faxq Firmware |
|
Metrics |
ssvc
|
Fri, 25 Oct 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the vulnerable device. Successful exploitation of this vulnerability could allow remote attacker to gain unauthorized access and take complete control of the targeted device. | |
Title | Authentication Bypass Vulnerability in Matrix Door Controller | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2024-10-25T16:20:32.207Z
Reserved: 2024-10-25T07:00:40.482Z
Link: CVE-2024-10381

Updated: 2024-10-25T16:20:27.159Z

Status : Analyzed
Published: 2024-10-25T13:15:17.810
Modified: 2024-11-14T21:44:53.280
Link: CVE-2024-10381

No data.