An authentication bypass vulnerability exists in the CMA run_server_6877 functionality of Garrett Metal Detectors iC Module CMA Version 5.0. A properly-timed network connection can lead to authentication bypass via session hijacking. An attacker can send a sequence of requests to trigger this vulnerability.
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1354 | third party advisory exploit |