Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
References
Link | Resource |
---|---|
https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers/ | Broken Link Third Party Advisory |
https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers/ | Broken Link Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers/ - Broken Link, Third Party Advisory |
Information
Published : 2020-08-07 22:15
Updated : 2024-11-21 05:04
NVD link : CVE-2020-15058
Mitre link : CVE-2020-15058
CVE.ORG link : CVE-2020-15058
JSON object : View
Products Affected
lindy-international
- 42633_firmware
- 42633