Summary
By making a password reset request, and manipulating a vulnerable parameter, it can be determined if the user exists or not. The vulnerability opens the door to enumerate account names on the system.
Products Potentially Affected
OS/Product |
Exposure |
Network OS |
No |
Repair Recommendations
None.
Please see the full security advisory article here for more details and updates.