InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 6.3 |
Information
Published : 2021-10-19 13:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38474
Mitre link : CVE-2021-38474
CVE.ORG link : CVE-2021-38474
JSON object : View
Products Affected
inhandnetworks
- ir615_firmware
- ir615
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts