AVer Information EH6108H+ devices with firmware X9.03.24.00.07l store passwords in a cleartext base64 format and require cleartext credentials in HTTP Cookie headers, which allows context-dependent attacks to obtain sensitive information by reading these strings.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/667480 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/92936 | |
http://www.kb.cert.org/vuls/id/667480 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/92936 |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/667480 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/92936 - |
Information
Published : 2016-09-19 01:59
Updated : 2024-11-21 02:56
NVD link : CVE-2016-6537
Mitre link : CVE-2016-6537
CVE.ORG link : CVE-2016-6537
JSON object : View
Products Affected
aver
- eh6108h\+
- eh6108h\+_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor