Client Application Firewall
Open.Automation.Software.REST.API.Authentication.Bypass
Description
This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in Open Automation Software platform.
This vulnerability is due to allowing use of Default User. A remote attacker could exploit this vulnerability by sending a crafted HTTP request to the target platform. Successful exploitation of the vulnerability could lead to modifying configurations of the platform.
Affected Products
Open Automation Software OAS Platform V16.00.0121
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://openautomationsoftware.com/downloads/releases/
Disable allowing requests to be made by Default User as a workaround.
Version Updates
Date | Version | Detail |
---|---|---|
2022-06-20 | 21.341 |