CVE-2008-4390

The Cisco Linksys WVC54GC wireless video camera before firmware 1.25 sends cleartext configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by sniffing the network.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:linksys_wvc54gc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:linksys_wvc54gc:-:*:*:*:*:*:*:*

History

21 Nov 2024, 00:51

Type Values Removed Values Added
References () http://secunia.com/advisories/33032 - Broken Link () http://secunia.com/advisories/33032 - Broken Link
References () http://www.kb.cert.org/vuls/id/528993 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/528993 - Patch, Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/MAPG-7HJKSA - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/MAPG-7HJKSA - Third Party Advisory, US Government Resource
References () http://www.linksys.com/servlet/Satellite?blobcol=urldata&blobheadername1=Content-Type&blobheadername2=Content-Disposition&blobheadervalue1=text%2Fplain&blobheadervalue2=inline%3B+filename%3DWVC54GC-V1.0_non-RoHS-v1.25_fw_ver.txt&blobkey=id&blobtable=MungoBlobs&blobwhere=1193776031728&ssbinary=true&lid=8104724130B17 - Product () http://www.linksys.com/servlet/Satellite?blobcol=urldata&blobheadername1=Content-Type&blobheadername2=Content-Disposition&blobheadervalue1=text%2Fplain&blobheadervalue2=inline%3B+filename%3DWVC54GC-V1.0_non-RoHS-v1.25_fw_ver.txt&blobkey=id&blobtable=MungoBlobs&blobwhere=1193776031728&ssbinary=true&lid=8104724130B17 - Product
References () http://www.securityfocus.com/bid/32666 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/32666 - Broken Link, Third Party Advisory, VDB Entry

25 Jan 2024, 20:50

Type Values Removed Values Added
CWE CWE-200 CWE-319
First Time Cisco linksys Wvc54gc
Cisco linksys Wvc54gc Firmware
CPE cpe:2.3:h:cisco:wvc54gc:1.15:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wvc54gc:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:linksys_wvc54gc:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:linksys_wvc54gc_firmware:*:*:*:*:*:*:*:*
References (SECUNIA) http://secunia.com/advisories/33032 - (SECUNIA) http://secunia.com/advisories/33032 - Broken Link
References (CONFIRM) http://www.linksys.com/servlet/Satellite?blobcol=urldata&blobheadername1=Content-Type&blobheadername2=Content-Disposition&blobheadervalue1=text%2Fplain&blobheadervalue2=inline%3B+filename%3DWVC54GC-V1.0_non-RoHS-v1.25_fw_ver.txt&blobkey=id&blobtable=MungoBlobs&blobwhere=1193776031728&ssbinary=true&lid=8104724130B17 - (CONFIRM) http://www.linksys.com/servlet/Satellite?blobcol=urldata&blobheadername1=Content-Type&blobheadername2=Content-Disposition&blobheadervalue1=text%2Fplain&blobheadervalue2=inline%3B+filename%3DWVC54GC-V1.0_non-RoHS-v1.25_fw_ver.txt&blobkey=id&blobtable=MungoBlobs&blobwhere=1193776031728&ssbinary=true&lid=8104724130B17 - Product
References (CONFIRM) http://www.kb.cert.org/vuls/id/MAPG-7HJKSA - (CONFIRM) http://www.kb.cert.org/vuls/id/MAPG-7HJKSA - Third Party Advisory, US Government Resource
References (BID) http://www.securityfocus.com/bid/32666 - (BID) http://www.securityfocus.com/bid/32666 - Broken Link, Third Party Advisory, VDB Entry
References (CERT-VN) http://www.kb.cert.org/vuls/id/528993 - Patch, US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/528993 - Patch, Third Party Advisory, US Government Resource
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 7.5

Information

Published : 2008-12-09 00:30

Updated : 2024-11-21 00:51


NVD link : CVE-2008-4390

Mitre link : CVE-2008-4390

CVE.ORG link : CVE-2008-4390


JSON object : View

Products Affected

cisco

  • linksys_wvc54gc_firmware
  • linksys_wvc54gc
CWE
CWE-319

Cleartext Transmission of Sensitive Information