The affected product is vulnerable to an improper authentication vulnerability, which may allow an attacker to impersonate a legitimate user as long as the device keeps the session active, since the attack takes advantage of the cookie header to generate "legitimate" requests.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2023-10-19T18:13:25.005Z

Updated: 2024-09-12T17:54:32.972Z

Reserved: 2023-09-12T23:06:14.688Z

Link: CVE-2023-41089

cve-icon Vulnrichment

Updated: 2024-08-02T18:46:11.906Z

cve-icon NVD

Status : Modified

Published: 2023-10-19T19:15:15.513

Modified: 2024-11-21T08:20:32.500

Link: CVE-2023-41089

cve-icon Redhat

No data.