Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-33106: CVE-2022-33106

WiJungle NGFW Version U250 was discovered to be vulnerable to No Rate Limit attack, allowing the attacker to brute force the admin password leading to Account Take Over.

CVE
#git#auth#ssl

# Exploit Title: WiJungle U250 NGFW - Brute-Force attack

# Exploit Author: Harshit Rajpal

# Hardware Model: WiJungle Next Generation Firewall U250

# Vendor Homepage: https://www.wijungle.com/# OS version: 9.4.9

##########################################################################

- Navigate to the WiJungle login page situated at local IP address.

- Turn on the Burp Proxy. Add random username,password and capture request.

- Send the request to intruder and launch a sniper attack with adding username and password in payload.

- Try for most common usernames. You can use the file: https://github.com/danielmiessler/SecLists/blob/master/Usernames/top-usernames-shortlist.txt

- Try for the most common passwords using various lists available online.

- Run the attack and you will find that the WiJungle NGFW has a “NO RATE LIMIT” which allows a user to brute-force admin credentials.

- I compromised the admin credentials on an approx combination of 30,000th payload.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda