InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource |
Information
Published : 2021-10-19 13:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38462
Mitre link : CVE-2021-38462
CVE.ORG link : CVE-2021-38462
JSON object : View
Products Affected
inhandnetworks
- ir615_firmware
- ir615
CWE
CWE-521
Weak Password Requirements