CVE-2021-38462

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4724:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4870:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:17

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource

Information

Published : 2021-10-19 13:15

Updated : 2024-11-21 06:17


NVD link : CVE-2021-38462

Mitre link : CVE-2021-38462

CVE.ORG link : CVE-2021-38462


JSON object : View

Products Affected

inhandnetworks

  • ir615_firmware
  • ir615
CWE
CWE-521

Weak Password Requirements