The (1) FTP and (2) Telnet services in Beck GmbH IPC@Chip are shipped with a default password, which allows remote attackers to gain unauthorized access.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/426459 | US Government Resource |
http://www.kb.cert.org/vuls/id/46219 | US Government Resource |
http://www.securityfocus.com/archive/1/186418 | Exploit |
http://www.securityfocus.com/bid/2769 | |
http://www.securityfocus.com/bid/2770 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6597 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6598 | |
http://www.kb.cert.org/vuls/id/426459 | US Government Resource |
http://www.kb.cert.org/vuls/id/46219 | US Government Resource |
http://www.securityfocus.com/archive/1/186418 | Exploit |
http://www.securityfocus.com/bid/2769 | |
http://www.securityfocus.com/bid/2770 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6597 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6598 |
Configurations
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/426459 - US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/46219 - US Government Resource | |
References | () http://www.securityfocus.com/archive/1/186418 - Exploit | |
References | () http://www.securityfocus.com/bid/2769 - | |
References | () http://www.securityfocus.com/bid/2770 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6597 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6598 - |
Information
Published : 2001-05-24 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1428
Mitre link : CVE-2001-1428
CVE.ORG link : CVE-2001-1428
JSON object : View
Products Affected
beck_ipc_gmbh
- ipc_at_chip_embedded-webserver
CWE