Home

Description

H3C SSL VPN contains a user enumeration vulnerability that allows attackers to identify valid usernames through the 'txtUsrName' POST parameter. Attackers can submit different usernames to the login_submit.cgi endpoint and analyze response messages to distinguish between existing and non-existing accounts.

PUBLISHED Reserved 2025-12-27 | Published 2025-12-30 | Updated 2025-12-30 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Observable Discrepancy

Product status

1.1
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/50742 (ExploitDB-50742) exploit

www.h3c.com (H3C Official Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5697.php (Zero Science Lab Disclosure (ZSL-2022-5697)) third-party-advisory

www.vulncheck.com/...ia-login-script-credential-verification (VulnCheck Advisory: H3C SSL VPN n/a Username Enumeration via Login Script Credential Verification) third-party-advisory

cve.org (CVE-2022-50800)

nvd.nist.gov (CVE-2022-50800)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.