Vulnerabilities > Authentication Bypass by Capture-replay

DATE CVE VULNERABILITY TITLE RISK
2022-04-01 CVE-2022-25159 Authentication Bypass by Capture-replay vulnerability in Mitsubishielectric products
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions and Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions allows a remote unauthenticated attacker to login to the product by replay attack.
network
high complexity
mitsubishielectric CWE-294
8.1
2022-03-29 CVE-2022-22936 Authentication Bypass by Capture-replay vulnerability in Saltstack Salt
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1.
low complexity
saltstack CWE-294
8.8
2022-03-23 CVE-2022-27254 Authentication Bypass by Capture-replay vulnerability in Honda Civic 2018 Firmware
The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal for each door-open request, which allows for a replay attack, a related issue to CVE-2019-20626.
high complexity
honda CWE-294
5.3
2022-03-10 CVE-2021-38296 Authentication Bypass by Capture-replay vulnerability in multiple products
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled".
network
low complexity
apache oracle CWE-294
7.5
2022-03-09 CVE-2022-22806 Authentication Bypass by Capture-replay vulnerability in Schneider-Electric products
A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause an unauthenticated connection to the UPS when a malformed connection is sent.
network
low complexity
schneider-electric CWE-294
critical
9.8
2022-02-24 CVE-2021-39364 Authentication Bypass by Capture-replay vulnerability in Honeywell Hbw2Per1 Firmware and Hdzp252Di Firmware
Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow command spoofing (for camera control) after ARP cache poisoning has been achieved.
network
low complexity
honeywell CWE-294
7.5
2022-02-24 CVE-2022-25838 Authentication Bypass by Capture-replay vulnerability in Laravel Fortify
Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept.
network
high complexity
laravel CWE-294
8.1
2022-01-06 CVE-2021-46145 Authentication Bypass by Capture-replay vulnerability in Honda Civic 2012
The keyfob subsystem in Honda Civic 2012 vehicles allows a replay attack for unlocking.
high complexity
honda CWE-294
5.3
2021-12-15 CVE-2021-40170 Authentication Bypass by Capture-replay vulnerability in Securitashome Alarm System Firmware Hpgwg0.0.2.23Fbguitrf1Bdbl.A30.20181117
An RF replay attack vulnerability in the SecuritasHome home alarm system, version HPGW-G 0.0.2.23F BG_U-ITR-F1-BD_BL.A30.20181117, allows an attacker to trigger arbitrary system functionality by replaying previously recorded signals.
network
high complexity
securitashome CWE-294
6.8
2021-12-08 CVE-2021-41030 Authentication Bypass by Capture-replay vulnerability in Fortinet Forticlient Enterprise Management Server
An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages.
network
low complexity
fortinet CWE-294
critical
9.1