NET&SYS MNG2120J 5.76.1006c and MNG6300 5.83.6305jrc2 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
References
Link | Resource |
---|---|
https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv | Third Party Advisory |
https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html | Exploit Third Party Advisory |
https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv | Third Party Advisory |
https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv - Third Party Advisory | |
References | () https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html - Exploit, Third Party Advisory |
14 Sep 2023, 16:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Telaum ming6300
Telaum ming2120j Firmware Telaum ming2120j Telaum Telaum ming6300 Firmware |
|
CPE | cpe:2.3:o:net-wave:ming6300_firmware:5.83.6305jrc2:*:*:*:*:*:*:* cpe:2.3:h:net-wave:ming2120j:4.10:*:*:*:*:*:*:* cpe:2.3:h:net-wave:ming6300:2.0:*:*:*:*:*:*:* |
cpe:2.3:o:telaum:ming2120j_firmware:5.76.1006c:*:*:*:*:*:*:* cpe:2.3:o:telaum:ming6300_firmware:5.83.6305jrc2:*:*:*:*:*:*:* cpe:2.3:h:telaum:ming2120j:4.10:*:*:*:*:*:*:* cpe:2.3:h:telaum:ming6300:2.0:*:*:*:*:*:*:* |
Information
Published : 2018-12-23 21:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20396
Mitre link : CVE-2018-20396
CVE.ORG link : CVE-2018-20396
JSON object : View
Products Affected
telaum
- ming6300
- ming2120j_firmware
- ming6300_firmware
- ming2120j
CWE
CWE-522
Insufficiently Protected Credentials