Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m9fp-x7x4-9799

Опубликовано: 05 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.7

Описание

System logs could be accessed through web management application due to a lack of access control.

An attacker can obtain the following sensitive information:

•     Wi-Fi access point credentials to which the EV charger can connect.

•     APN web address and credentials.

•     IPSEC credentials.

•     Web interface access credentials for user and admin accounts.

•     JuiceBox system components (software installed, model, firmware version, etc.).

•     C2G configuration details.

•     Internal IP addresses.

•     OTA firmware update configurations (DNS servers).

All the credentials are stored in logs in an unencrypted plaintext format.

System logs could be accessed through web management application due to a lack of access control.

An attacker can obtain the following sensitive information:

•     Wi-Fi access point credentials to which the EV charger can connect.

•     APN web address and credentials.

•     IPSEC credentials.

•     Web interface access credentials for user and admin accounts.

•     JuiceBox system components (software installed, model, firmware version, etc.).

•     C2G configuration details.

•     Internal IP addresses.

•     OTA firmware update configurations (DNS servers).

All the credentials are stored in logs in an unencrypted plaintext format.

EPSS

Процентиль: 25%
0.00087
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 5.7
nvd
больше 1 года назад

System logs could be accessed through web management application due to a lack of access control. An attacker can obtain the following sensitive information: •     Wi-Fi access point credentials to which the EV charger can connect. •     APN web address and credentials. •     IPSEC credentials. •     Web interface access credentials for user and admin accounts. •     JuiceBox system components (software installed, model, firmware version, etc.). •     C2G configuration details. •     Internal IP addresses. •     OTA firmware update configurations (DNS servers). All the credentials are stored in logs in an unencrypted plaintext format.

EPSS

Процентиль: 25%
0.00087
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-200