Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6p9j-wxqr-cxf6

Опубликовано: 26 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

The web interface of the affected devices is designed to hide the LDAP credentials even for administrative users. But configuring LDAP authentication to "SIMPLE", the device communicates with the LDAP server in clear-text. The LDAP password can be retrieved from this clear-text communication. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

The web interface of the affected devices is designed to hide the LDAP credentials even for administrative users. But configuring LDAP authentication to "SIMPLE", the device communicates with the LDAP server in clear-text. The LDAP password can be retrieved from this clear-text communication. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

EPSS

Процентиль: 42%
0.00201
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-767

Связанные уязвимости

CVSS3: 5.3
nvd
около 1 года назад

The web interface of the affected devices is designed to hide the LDAP credentials even for administrative users. But configuring LDAP authentication to "SIMPLE", the device communicates with the LDAP server in clear-text. The LDAP password can be retrieved from this clear-text communication. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

EPSS

Процентиль: 42%
0.00201
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-767