Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g94p-m365-483p

Опубликовано: 04 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

Verizon LVSKIHP 5G outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.

Verizon LVSKIHP 5G outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.

EPSS

Процентиль: 59%
0.00377
Низкий

8.1 High

CVSS3

Дефекты

CWE-668

Связанные уязвимости

CVSS3: 8.1
nvd
почти 4 года назад

Verizon 5G Home LVSKIHP outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.

EPSS

Процентиль: 59%
0.00377
Низкий

8.1 High

CVSS3

Дефекты

CWE-668