An issue was discovered in genua genugate before 9.0 Z p19, 9.1.x through 9.6.x before 9.6 p7, and 10.x before 10.1 p4. The Web Interfaces (Admin, Userweb, Sidechannel) can use different methods to perform the authentication of a user. A specific authentication method during login does not check the provided data (when a certain manipulation occurs) and returns OK for any authentication request. This allows an attacker to login to the admin panel as a user of his choice, e.g., the root user (with highest privileges) or even a non-existing user.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Genuagate | Genua | * | 9.0 (including) |
Genuagate | Genua | 10.0 (including) | 10.1 (including) |
Genuagate | Genua | 9.0 (including) | 9.0 (including) |
Genuagate | Genua | 9.0-p1 (including) | 9.0-p1 (including) |
Genuagate | Genua | 9.0-p10 (including) | 9.0-p10 (including) |
Genuagate | Genua | 9.0-p11 (including) | 9.0-p11 (including) |
Genuagate | Genua | 9.0-p12 (including) | 9.0-p12 (including) |
Genuagate | Genua | 9.0-p13 (including) | 9.0-p13 (including) |
Genuagate | Genua | 9.0-p14 (including) | 9.0-p14 (including) |
Genuagate | Genua | 9.0-p15 (including) | 9.0-p15 (including) |
Genuagate | Genua | 9.0-p16 (including) | 9.0-p16 (including) |
Genuagate | Genua | 9.0-p17 (including) | 9.0-p17 (including) |
Genuagate | Genua | 9.0-p18 (including) | 9.0-p18 (including) |
Genuagate | Genua | 9.0-p2 (including) | 9.0-p2 (including) |
Genuagate | Genua | 9.0-p3 (including) | 9.0-p3 (including) |
Genuagate | Genua | 9.0-p4 (including) | 9.0-p4 (including) |
Genuagate | Genua | 9.0-p5 (including) | 9.0-p5 (including) |
Genuagate | Genua | 9.0-p6 (including) | 9.0-p6 (including) |
Genuagate | Genua | 9.0-p7 (including) | 9.0-p7 (including) |
Genuagate | Genua | 9.0-p8 (including) | 9.0-p8 (including) |
Genuagate | Genua | 9.0-p9 (including) | 9.0-p9 (including) |
Genuagate | Genua | 9.6.0 (including) | 9.6.0 (including) |
Genuagate | Genua | 9.6.0-p1 (including) | 9.6.0-p1 (including) |
Genuagate | Genua | 9.6.0-p2 (including) | 9.6.0-p2 (including) |
Genuagate | Genua | 9.6.0-p3 (including) | 9.6.0-p3 (including) |
Genuagate | Genua | 9.6.0-p4 (including) | 9.6.0-p4 (including) |
Genuagate | Genua | 9.6.0-p5 (including) | 9.6.0-p5 (including) |
Genuagate | Genua | 9.6.0-p6 (including) | 9.6.0-p6 (including) |
Genuagate | Genua | 10.1 (including) | 10.1 (including) |
Genuagate | Genua | 10.1-p1 (including) | 10.1-p1 (including) |
Genuagate | Genua | 10.1-p2 (including) | 10.1-p2 (including) |
Genuagate | Genua | 10.1-p3 (including) | 10.1-p3 (including) |
As data is migrated to the cloud, if access does not require authentication, it can be easier for attackers to access the data from anywhere on the Internet.