Описание
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 2.0.1 leaks sensitive information during boot-up, which allows attackers to obtain the MD5 hash of the Admin password, MD5 hash of the physical password, and other registration information.
Ссылки
- Vendor AdvisoryURL Repurposed
- Vendor AdvisoryURL Repurposed
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:pingtel:xpressa:1.2.5:*:*:*:*:*:*:*
cpe:2.3:h:pingtel:xpressa:1.2.7.4:*:*:*:*:*:*:*
cpe:2.3:h:pingtel:xpressa:1.2.8:*:*:*:*:*:*:*
cpe:2.3:h:pingtel:xpressa:2.0:*:*:*:*:*:*:*
cpe:2.3:h:pingtel:xpressa:2.0.1:*:*:*:*:*:*:*
EPSS
Процентиль: 69%
0.00595
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 2.0.1 leaks sensitive information during boot-up, which allows attackers to obtain the MD5 hash of the Admin password, MD5 hash of the physical password, and other registration information.
EPSS
Процентиль: 69%
0.00595
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other