FURUNO FELCOM 250 and 500 devices allow unauthenticated access to the xml/permission.xml file containing all of the system's usernames and passwords. This includes the Admin and Service user accounts and their unsalted MD5 hashes, as well as the SMS server password in cleartext.
References
Link | Resource |
---|---|
https://cyberskr.com/blog/furuno-felcom.html | Exploit Technical Description Third Party Advisory |
https://gist.github.com/CyberSKR/c00eabd6b1d5603d724b615ab358ff31 | Third Party Advisory |
https://cyberskr.com/blog/furuno-felcom.html | Exploit Technical Description Third Party Advisory |
https://gist.github.com/CyberSKR/c00eabd6b1d5603d724b615ab358ff31 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://cyberskr.com/blog/furuno-felcom.html - Exploit, Technical Description, Third Party Advisory | |
References | () https://gist.github.com/CyberSKR/c00eabd6b1d5603d724b615ab358ff31 - Third Party Advisory |
Information
Published : 2018-09-10 17:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16705
Mitre link : CVE-2018-16705
CVE.ORG link : CVE-2018-16705
JSON object : View
Products Affected
furuno
- felcom_500_firmware
- felcom_250
- felcom_250_firmware
- felcom_500
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor