CVE-2018-10024

ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ubiquoss:vp5208a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ubiquoss:vp5208a:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:40

Type Values Removed Values Added
References () https://www.tarlogic.com/advisories/Tarlogic-2018-002.txt - Third Party Advisory () https://www.tarlogic.com/advisories/Tarlogic-2018-002.txt - Third Party Advisory

Information

Published : 2018-04-11 17:29

Updated : 2024-11-21 03:40


NVD link : CVE-2018-10024

Mitre link : CVE-2018-10024

CVE.ORG link : CVE-2018-10024


JSON object : View

Products Affected

ubiquoss

  • vp5208a_firmware
  • vp5208a
CWE
CWE-522

Insufficiently Protected Credentials