Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g5w8-cv66-2r79

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use of Hard-coded Credentials in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows an unauthenticated remote attacker to log into the database with admin-privileges. This may result in complete compromise of the confidentiality and integrity of the stored data as well as a high availability impact on the database itself. In addition, an attacker may execute arbitrary commands on the underlying operating system.

Use of Hard-coded Credentials in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows an unauthenticated remote attacker to log into the database with admin-privileges. This may result in complete compromise of the confidentiality and integrity of the stored data as well as a high availability impact on the database itself. In addition, an attacker may execute arbitrary commands on the underlying operating system.

EPSS

Процентиль: 93%
0.09936
Низкий

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 10
nvd
около 5 лет назад

Use of Hard-coded Credentials in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows an unauthenticated remote attacker to log into the database with admin-privileges. This may result in complete compromise of the confidentiality and integrity of the stored data as well as a high availability impact on the database itself. In addition, an attacker may execute arbitrary commands on the underlying operating system.

EPSS

Процентиль: 93%
0.09936
Низкий

Дефекты

CWE-798