i-doit pro 25 and below and I-doit open 25 and below are configured with insecure default administrator credentials, and there is no warning or prompt to ask users to change the default password and account name. Unauthenticated attackers can exploit this vulnerability to obtain Administrator privileges, resulting in them being able to perform arbitrary system operations or cause a Denial of Service (DoS).
References
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 04:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
19 Sep 2023, 13:41
Type | Values Removed | Values Added |
---|---|---|
First Time |
I-doit i-doit
I-doit |
|
CPE | cpe:2.3:a:i-doit:i-doit:*:*:*:*:pro:*:*:* cpe:2.3:a:i-doit:i-doit:*:*:*:*:open:*:*:* |
|
CWE | CWE-798 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://github.com/leekenghwa/CVE-2023-37755---Hardcoded-Admin-Credential-in-i-doit-Pro-25-and-below/blob/main/README.md - Exploit, Third Party Advisory | |
References | (MISC) https://medium.com/@ray.999/d7a54030e055 - Exploit, Third Party Advisory | |
References | (MISC) https://medium.com/@ray.999/i-doit-v25-and-below-incorrect-access-control-issue-cve-2023-37755-d7a54030e055 - Exploit, Third Party Advisory |
15 Sep 2023, 00:31
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-14 20:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-37755
Mitre link : CVE-2023-37755
CVE.ORG link : CVE-2023-37755
JSON object : View
Products Affected
i-doit
- i-doit
CWE
CWE-798
Use of Hard-coded Credentials