Comba AP2600-I devices through A02,0202N00PD2 are prone to password disclosure via an insecure authentication mechanism. The HTML source code of the login page contains values that allow obtaining the username and password. The username are password values are a double md5 of the plaintext real value, i.e., md5(md5(value)).
References
Link | Resource |
---|---|
https://www.comba-telecom.com/en/news | Vendor Advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26164 | Exploit Third Party Advisory |
https://www.comba-telecom.com/en/news | Vendor Advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26164 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.comba-telecom.com/en/news - Vendor Advisory | |
References | () https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26164 - Exploit, Third Party Advisory |
Information
Published : 2020-03-19 18:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15653
Mitre link : CVE-2019-15653
CVE.ORG link : CVE-2019-15653
JSON object : View
Products Affected
comba
- ap2600-i_-_a02_-_0202n00pd2_firmware
- ap2600-i_-_a02_-_0202n00pd2