Vulnerabilities > Authentication Bypass by Capture-replay

DATE CVE VULNERABILITY TITLE RISK
2020-11-02 CVE-2018-17932 Authentication Bypass by Capture-replay vulnerability in Juuko K-800 Firmware
JUUKO K-800 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.) is vulnerable to a replay attack and command forgery, which could allow attackers to replay commands, control the device, view commands, or cause the device to stop running.
network
low complexity
juuko CWE-294
critical
9.8
2020-10-15 CVE-2020-27157 Authentication Bypass by Capture-replay vulnerability in Veritas Aptare 10.4
Veritas APTARE versions prior to 10.5 included code that bypassed the normal login process when specific authentication credentials were provided to the server.
network
high complexity
veritas CWE-294
8.1
2020-10-07 CVE-2020-24722 Authentication Bypass by Capture-replay vulnerability in Exposure Notifications Project Exposure Notifications 20201005
An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS.
network
high complexity
exposure-notifications-project CWE-294
5.9
2020-08-21 CVE-2019-11856 Authentication Bypass by Capture-replay vulnerability in Sierrawireless Aleos
A nonce reuse vulnerability exists in the ACEView service of ALEOS before 4.13.0, 4.9.5, and 4.4.9 allowing message replay.
network
low complexity
sierrawireless CWE-294
3.8
2020-07-23 CVE-2020-15688 Authentication Bypass by Capture-replay vulnerability in Embedthis Goahead
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks.
network
low complexity
embedthis CWE-294
8.8
2020-07-14 CVE-2020-10045 Authentication Bypass by Capture-replay vulnerability in Siemens products
A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18).
network
low complexity
siemens CWE-294
8.8
2020-07-10 CVE-2020-4042 Authentication Bypass by Capture-replay vulnerability in Bareos
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself.
network
high complexity
bareos CWE-294
6.8
2020-06-23 CVE-2020-9438 Authentication Bypass by Capture-replay vulnerability in Tinxy Smart Wifi Door Lock Firmware
Tinxy Door Lock with firmware before 3.2 allow attackers to unlock a door by replaying an Unlock request that occurred when the attacker was previously authorized.
network
high complexity
tinxy CWE-294
5.9
2020-05-07 CVE-2020-12692 Authentication Bypass by Capture-replay vulnerability in multiple products
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0.
network
low complexity
openstack canonical CWE-294
5.4
2020-04-06 CVE-2020-5300 Authentication Bypass by Capture-replay vulnerability in ORY Hydra
In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token.
network
high complexity
ory CWE-294
5.3