Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.

Project Subscriptions

Vendors Products
At-modem-emulator Subscribe
At-modem-emulator Firmware Subscribe
Com-server 20ma Subscribe
Com-server 20ma Firmware Subscribe
Com-server \+\+ Subscribe
Com-server \+\+ Firmware Subscribe
Com-server Highspeed 100basefx Subscribe
Com-server Highspeed 100basefx Firmware Subscribe
Com-server Highspeed 100baselx Subscribe
Com-server Highspeed 100baselx Firmware Subscribe
Com-server Highspeed 19\" 1port Subscribe
Com-server Highspeed 19\" 1port Firmware Subscribe
Com-server Highspeed 19\" 4port Subscribe
Com-server Highspeed 19\" 4port Firmware Subscribe
Com-server Highspeed Compact Subscribe
Com-server Highspeed Compact Firmware Subscribe
Com-server Highspeed Industry Subscribe
Com-server Highspeed Industry Firmware Subscribe
Com-server Highspeed Isolated Subscribe
Com-server Highspeed Isolated Firmware Subscribe
Com-server Highspeed Lc Subscribe
Com-server Highspeed Lc Firmware Subscribe
Com-server Highspeed Oem Subscribe
Com-server Highspeed Oem Firmware Subscribe
Com-server Highspeed Office 1port Subscribe
Com-server Highspeed Office 1port Firmware Subscribe
Com-server Highspeed Office 4port Subscribe
Com-server Highspeed Office 4port Firmware Subscribe
Com-server Highspeed Poe Subscribe
Com-server Highspeed Poe 3x Isolated Subscribe
Com-server Highspeed Poe 3x Isolated Firmware Subscribe
Com-server Highspeed Poe Firmware Subscribe
Com-server Highspeed Ul Subscribe
Com-server Highspeed Ul Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-45850 Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 01 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-05-01T19:01:20.740Z

Reserved: 2022-10-11T13:32:19.672Z

Link: CVE-2022-42787

cve-icon Vulnrichment

Updated: 2024-08-03T13:19:04.509Z

cve-icon NVD

Status : Modified

Published: 2022-11-10T12:15:10.927

Modified: 2024-11-21T07:25:20.673

Link: CVE-2022-42787

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses