An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device's authentication and get access to the administrative interface.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://rcesecurity.com | not applicable |
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txt | third party advisory exploit |
http://seclists.org/fulldisclosure/2023/Apr/7 | mailing list third party advisory exploit |
http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html | third party advisory exploit |