CVE-2018-18929

The Tightrope Media Carousel Seneca HDn Windows-based appliance 7.0.4.104 is shipped with a default local administrator username and password. This can be found by a limited user account in an "unattend.xml" file left over on the C: drive from the Sysprep process. An attacker with this username and password can leverage it to gain administrator-level access on the system.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:trms:seneca_hdn_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:trms:seneca_hdn:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:56

Type Values Removed Values Added
References () https://www.drewgreen.net/vulnerabilities-in-tightrope-media-systems-carousel/ - Exploit, Third Party Advisory () https://www.drewgreen.net/vulnerabilities-in-tightrope-media-systems-carousel/ - Exploit, Third Party Advisory

Information

Published : 2019-10-29 20:15

Updated : 2024-11-21 03:56


NVD link : CVE-2018-18929

Mitre link : CVE-2018-18929

CVE.ORG link : CVE-2018-18929


JSON object : View

Products Affected

trms

  • seneca_hdn
  • seneca_hdn_firmware
CWE
CWE-798

Use of Hard-coded Credentials