FaceSentry Access Control System 6.4.8 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to change administrator passwords, add new admin users, or open access control doors by tricking authenticated users into loading a specially crafted webpage.
References
| Link | Resource |
|---|---|
| http://www.iwt.com.hk | Product |
| https://www.exploit-db.com/exploits/47065 | Exploit Third Party Advisory VDB Entry |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5524.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5524.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-24 20:15
Updated : 2025-12-30 20:14
NVD link : CVE-2019-25242
Mitre link : CVE-2019-25242
CVE.ORG link : CVE-2019-25242
JSON object : View
Products Affected
iwt
- facesentry_access_control_system
- facesentry_access_control_system_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
