CVE-2021-38474

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4724:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4870:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:17

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 - Third Party Advisory, US Government Resource
CVSS v2 : 5.0
v3 : 9.8
v2 : 5.0
v3 : 6.3

Information

Published : 2021-10-19 13:15

Updated : 2024-11-21 06:17


NVD link : CVE-2021-38474

Mitre link : CVE-2021-38474

CVE.ORG link : CVE-2021-38474


JSON object : View

Products Affected

inhandnetworks

  • ir615_firmware
  • ir615
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts