CVE-2018-15124

Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zipato:zipabox_firmware:118:*:*:*:*:*:*:*
cpe:2.3:h:zipato:zipabox:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:50

Type Values Removed Values Added
References () https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/08/08/klcert-18-004-zipato-zipabox-weak-hash-algorithm/ - Third Party Advisory, US Government Resource () https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/08/08/klcert-18-004-zipato-zipabox-weak-hash-algorithm/ - Third Party Advisory, US Government Resource

Information

Published : 2018-08-13 21:48

Updated : 2024-11-21 03:50


NVD link : CVE-2018-15124

Mitre link : CVE-2018-15124

CVE.ORG link : CVE-2018-15124


JSON object : View

Products Affected

zipato

  • zipabox
  • zipabox_firmware
CWE
CWE-326

Inadequate Encryption Strength