Описание
radmin in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier starts a process port 25072 that can be accessed with a default "jstwo" password, which allows remote attackers to gain access.
Ссылки
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:esesix:thintune_extreme:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_l:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_m:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_mobile:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_s:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_xm:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_xs:2.4.38:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.032
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
radmin in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier starts a process port 25072 that can be accessed with a default "jstwo" password, which allows remote attackers to gain access.
EPSS
Процентиль: 87%
0.032
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other