CVE-2022-50800
User Enumeration Vulnerability in H3C SSL VPN via login_submit.cgi
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| h3c | ssl_vpn | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-203 | The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in H3C SSL VPN allows attackers to perform user enumeration by submitting different usernames to the login_submit.cgi endpoint via the 'txtUsrName' POST parameter. By analyzing the response messages, attackers can determine which usernames are valid on the system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by submitting different usernames to the login_submit.cgi endpoint using the 'txtUsrName' POST parameter and analyzing the response messages to distinguish between existing and non-existing accounts. For example, you can use curl commands to automate this process: curl -X POST -d "txtUsrName=someusername" https://target/vpn/login_submit.cgi and observe the response differences to identify valid usernames.
How can this vulnerability impact me? :
The vulnerability can allow attackers to identify valid usernames, which can be used to facilitate further attacks such as brute force password attempts or targeted phishing, potentially compromising user accounts and system security.