9.8
CVSSv3

CVE-2021-27215

Published: 03/03/2021 Updated: 12/07/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in genua genugate prior to 9.0 Z p19, 9.1.x up to and including 9.6.x prior to 9.6 p7, and 10.x prior to 10.1 p4. The Web Interfaces (Admin, Userweb, Sidechannel) can use different methods to perform the authentication of a user. A specific authentication method during login does not check the provided data (when a certain manipulation occurs) and returns OK for any authentication request. This allows an malicious user to login to the admin panel as a user of his choice, e.g., the root user (with highest privileges) or even a non-existing user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

genua genuagate 10.1

genua genuagate

genua genuagate 9.0

genua genuagate 9.6.0

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> SEC Consult SA-20210301-0 :: Authentication bypass vulnerability in Genua GenuGate High Resistance Firewall <!--X-Subj ...