Access Control Vulnerability in Aviatrix Controller by Aviatrix
CVE-2020-26552
7.5HIGH
Summary
An access control vulnerability was identified in Aviatrix Controller versions before R6.0.2483, where multiple executable files responsible for implementing API endpoints did not enforce proper session ID validation for access. This oversight allows unauthorized users to interact with API functionalities without any necessary authentication, potentially exposing sensitive data or causing unauthorized changes.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved