QED ResourceXpress Qubi3 devices before 1.40.9 could allow a local attacker (with physical access to the device) to obtain sensitive information via the debug interface (keystrokes over a USB cable), aka wireless password visibility.
References
Link | Resource |
---|---|
https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/878641153/v1.40.9 | Issue Tracking Vendor Advisory |
https://www.resourcexpress.com/meeting-room-booking-systems/hardware/qubi3/ | Product Vendor Advisory |
https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/878641153/v1.40.9 | Issue Tracking Vendor Advisory |
https://www.resourcexpress.com/meeting-room-booking-systems/hardware/qubi3/ | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/878641153/v1.40.9 - Issue Tracking, Vendor Advisory | |
References | () https://www.resourcexpress.com/meeting-room-booking-systems/hardware/qubi3/ - Product, Vendor Advisory |
Information
Published : 2020-11-17 14:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25746
Mitre link : CVE-2020-25746
CVE.ORG link : CVE-2020-25746
JSON object : View
Products Affected
resourcexpress
- qubi3
- qubi3_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor