HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 | Third Party Advisory VDB Entry |
https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf | Mitigation Vendor Advisory |
Configurations
History
26 Mar 2021, 21:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | CWE-352 | |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | CWE-352 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CWE | CWE-352 | |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CWE | CWE-352 | |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CWE | CWE-352 | |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | CWE-352 | |
CWE | CWE-352 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CWE | CWE-352 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | CWE-352 | |
CWE | CWE-352 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CWE | CWE-352 | |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CWE | CWE-352 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | CWE-352 | |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CWE | CWE-352 | |
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:h:hidglobal:omnikey_5427:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | CWE-352 | |
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf - Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
24 Mar 2021, 16:50
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CWE | ||
CWE | ||
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
New CVE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | ||
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CPE | cpe:2.3:o:hidglobal:omnikey_5427_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:omnikey_5127_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:omnikey_5127:-:*:*:*:*:*:*:* |
|
CWE | ||
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
Information
Published : 2021-03-24 16:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-36283
Mitre link : CVE-2020-36283
CVE.ORG link : CVE-2020-36283
JSON object : View
Products Affected
hidglobal
- omnikey_5127
- omnikey_5427_firmware
- omnikey_5127_firmware
- omnikey_5427
CWE
CWE-352
Cross-Site Request Forgery (CSRF)