ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).
References
Link | Resource |
---|---|
https://www.tarlogic.com/advisories/Tarlogic-2018-002.txt | Third Party Advisory |
https://www.tarlogic.com/advisories/Tarlogic-2018-002.txt | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tarlogic.com/advisories/Tarlogic-2018-002.txt - Third Party Advisory |
Information
Published : 2018-04-11 17:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-10024
Mitre link : CVE-2018-10024
CVE.ORG link : CVE-2018-10024
JSON object : View
Products Affected
ubiquoss
- vp5208a_firmware
- vp5208a
CWE
CWE-522
Insufficiently Protected Credentials