Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
2FA bypass in Kaseya VSA <= v9.5.6
Vulnerability Description
Kaseya VSA before 9.5.7 allows attackers to bypass the 2FA requirement. The need to use 2FA for authentication in enforce client-side instead of server-side and can be bypassed using a local proxy. Thus rendering 2FA useless. Detailed description --- During the login process, after the user authenticates with username and password, the server sends a response to the client with the booleans MFARequired and MFAEnroled. If the attacker has obtained a password of a user and used an intercepting proxy (e.g. Burp Suite) to change the value of MFARequered from True to False, there is no prompt for the second factor, but the user is still logged in.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vulnerability Type
N/A
Vulnerability Title
Kaseya VSA 安全漏洞
Vulnerability Description
Kaseya VSA是美国Kaseya公司的托管服务提供商 (MSP) 常用来管理客户网络的RMM(远程监控和管理)软件。 Kaseya VSA存在安全漏洞,该漏洞源于 2FA 绕过。
CVSS Information
N/A
Vulnerability Type
N/A