Описание
The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.
Ссылки
- Exploit
- Exploit
- US Government Resource
- Vendor Advisory
- Exploit
- Exploit
- US Government Resource
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:a:polyvision:roomwizard_firmware:3.2.3:*:*:*:*:*:*:*
cpe:2.3:h:polyvision:roomwizard:*:*:*:*:*:*:*:*
EPSS
Процентиль: 81%
0.01475
Низкий
5 Medium
CVSS2
Дефекты
CWE-200
Связанные уязвимости
github
почти 4 года назад
The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.
EPSS
Процентиль: 81%
0.01475
Низкий
5 Medium
CVSS2
Дефекты
CWE-200