A CWE-598 “Use of GET Request Method with Sensitive Query Strings” was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. Both the SHA-1 hash of the password as well as the session tokens are included as part of the URL and therefore exposed to information leakage scenarios. An attacker capable of accessing such values (e.g., victim browser, network traffic inspection) can exploit this vulnerability to leak both the password hash as well as session tokens and bypass the authentication mechanism using a pass-the-hash attack.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 13 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A CWE-598 “Use of GET Request Method with Sensitive Query Strings” was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. Both the SHA-1 hash of the password as well as the session tokens are included as part of the URL and therefore exposed to information leakage scenarios. An attacker capable of accessing such values (e.g., victim browser, network traffic inspection) can exploit this vulnerability to leak both the password hash as well as session tokens and bypass the authentication mechanism using a pass-the-hash attack. | |
Weaknesses | CWE-598 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Nozomi
Published: 2025-02-13T16:01:29.526Z
Updated: 2025-02-13T16:53:38.046Z
Reserved: 2024-12-02T10:29:13.374Z
Link: CVE-2024-12012

Updated: 2025-02-13T16:53:34.322Z

Status : Received
Published: 2025-02-13T16:15:43.913
Modified: 2025-02-13T16:15:43.913
Link: CVE-2024-12012

No data.