CVE-2021-28911

BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /tmp path which contains some sensitive data (e.g. device serial number). Having those info, a possible loginId can be self-calculated in a brute force attack against BMX interface. This is usable and part of an attack chain to gain SSH root access.
References
Link Resource
https://psytester.github.io/CVE-2021-28911 Third Party Advisory
https://psytester.github.io/CVE-2021-28911 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:*

History

21 Nov 2024, 06:00

Type Values Removed Values Added
References () https://psytester.github.io/CVE-2021-28911 - Third Party Advisory () https://psytester.github.io/CVE-2021-28911 - Third Party Advisory

Information

Published : 2021-09-09 18:15

Updated : 2024-11-21 06:00


NVD link : CVE-2021-28911

Mitre link : CVE-2021-28911

CVE.ORG link : CVE-2021-28911


JSON object : View

Products Affected

bab-technologie

  • eibport_firmware
  • eibport
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts

CWE-863

Incorrect Authorization