The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. E.g. an attacker can forge malicious links to reset the admin password or create new users.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

The vendor provides a firmware update to version 7.40 (or higher) which can be downloaded via the vendor's customer server portal.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Wed, 11 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Dec 2024 17:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}


Wed, 11 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Description The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. E.g. an attacker can forge malicious links to reset the admin password or create new users.
Title Cross-Site Request-Forgery
Weaknesses CWE-352
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-11-03T21:54:25.009Z

Reserved: 2024-03-05T09:15:40.202Z

Link: CVE-2024-28141

cve-icon Vulnrichment

Updated: 2025-11-03T21:54:25.009Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-11T16:15:10.160

Modified: 2025-11-03T22:16:49.913

Link: CVE-2024-28141

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses