Because the web management interface for Unified Intents' Unified Remote solution does not itself require authentication, a remote, unauthenticated attacker can change or disable authentication requirements for the Unified Remote protocol, and leverage this now-unauthenticated access to run code of the attacker's choosing.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://github.com/rapid7/metasploit-framework/pull/16989 | issue tracking exploit patch technical description |