Using API in the 2N OS device, authorized user can enable...
Moderate severity
Unreviewed
Published
Feb 6, 2025
to the GitHub Advisory Database
•
Updated Feb 6, 2025
Description
Published by the National Vulnerability Database
Feb 6, 2025
Published to the GitHub Advisory Database
Feb 6, 2025
Last updated
Feb 6, 2025
Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log.
References