CVE-2020-11681

Castel NextGen DVR v1.0.0 stores and displays credentials for the associated SMTP server in cleartext. Low privileged users can exploit this to create an administrator user and obtain the SMTP credentials.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:castel:nextgen_dvr_firmware:1.0.0:*:*:*:*:*:*:*
cpe:2.3:h:castel:nextgen_dvr:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html - Third Party Advisory () http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html - Third Party Advisory
References () http://seclists.org/fulldisclosure/2020/Jun/8 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Jun/8 - Mailing List, Third Party Advisory
References () https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass - Third Party Advisory () https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass - Third Party Advisory

Information

Published : 2020-06-04 19:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11681

Mitre link : CVE-2020-11681

CVE.ORG link : CVE-2020-11681


JSON object : View

Products Affected

castel

  • nextgen_dvr
  • nextgen_dvr_firmware
CWE
CWE-522

Insufficiently Protected Credentials