{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-40895","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-03T12:28:42.915Z","dateReserved":"2022-09-19T00:00:00.000Z","datePublished":"2022-10-06T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2022-10-06T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"In certain Nedi products, a vulnerability in the web UI of NeDi login & Community login could allow an unauthenticated, remote attacker to affect the integrity of a device via a User Enumeration vulnerability. The vulnerability is due to insecure design, where a difference in forgot password utility could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. This affects NeDi 1.0.7 for OS X 1.0.7 <= and NeDi for Suse 1.0.7 <= and NeDi for FreeBSD 1.0.7 <=."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"http://forum.nedi.ch/index.php"},{"url":"https://www.nedi.ch/"},{"url":"https://gist.github.com/UditChavda/2f2effa477a429b485ae7e2dc3bbd04f"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:28:42.915Z"},"title":"CVE Program Container","references":[{"url":"http://forum.nedi.ch/index.php","tags":["x_transferred"]},{"url":"https://www.nedi.ch/","tags":["x_transferred"]},{"url":"https://gist.github.com/UditChavda/2f2effa477a429b485ae7e2dc3bbd04f","tags":["x_transferred"]}]}]}}