Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j6hr-vmm6-m6c2

Опубликовано: 20 янв. 2022
Источник: github
Github: Не прошло ревью

Описание

Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device's firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet.

Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device's firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet.

EPSS

Процентиль: 7%
0.00027
Низкий

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 5.7
nvd
около 4 лет назад

Communication to the AMC2 uses a state-of-the-art cryptographic algorithm for symmetric encryption called Blowfish. An attacker could retrieve the key from the firmware to decrypt network traffic between the AMC2 and the host system. Thus, an attacker can exploit this vulnerability to decrypt and modify network traffic, decrypt and further investigate the device\'s firmware file, and change the device configuration. The attacker needs to have access to the local network, typically even the same subnet.

EPSS

Процентиль: 7%
0.00027
Низкий

Дефекты

CWE-798