An authentication bypass vulnerability exists in the Authentication functionality of Weston Embedded uC-FTPs v 1.98.00. A specially crafted set of network packets can lead to authentication bypass and denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680 | third party advisory exploit |
https://github.com/weston-embedded/uC-FTPs/pull/1 | patch |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1680 |