virus logo Client Application Firewall

Open.Automation.Software.REST.API.Authentication.Bypass

description-logoDescription

This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in Open Automation Software platform.
This vulnerability is due to allowing use of Default User. A remote attacker could exploit this vulnerability by sending a crafted HTTP request to the target platform. Successful exploitation of the vulnerability could lead to modifying configurations of the platform.

affected-products-logoAffected Products

Open Automation Software OAS Platform V16.00.0121

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://openautomationsoftware.com/downloads/releases/
Disable allowing requests to be made by Default User as a workaround.

Version Updates

Date Version Detail
2022-06-20 21.341