ID |
CVE-2020-28331
|
Sažetak |
Barco wePresent WiPG-1600W devices have Improper Access Control. Affected Version(s): 2.5.1.8. The Barco wePresent WiPG-1600W device has an SSH daemon included in the firmware image. By default, the SSH daemon is disabled and does not start at system boot. The system initialization scripts read a device configuration file variable to see if the SSH daemon should be started. The web interface does not provide a visible capability to alter this configuration file variable. However, a malicious actor can include this variable in a POST such that the SSH daemon will be started when the device boots. |
Reference |
|
CVSS |
Base: | 5.0 |
Impact: | 2.9 |
Exploitability: | 10.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
PARTIAL |
NONE |
|
CVSS vektor |
AV:N/AC:L/Au:N/C:N/I:P/A:N |
Zadnje važnije ažuriranje |
12-07-2022 - 17:42 |
Objavljeno |
24-11-2020 - 18:15 |