Описание
The INCLUDE_SECURITY functionality in Wind River VxWorks 6.x, 5.x, and earlier uses the LOGIN_USER_NAME and LOGIN_USER_PASSWORD (aka LOGIN_PASSWORD) parameters to create hardcoded credentials, which makes it easier for remote attackers to obtain access via a (1) telnet, (2) rlogin, or (3) FTP session.
Ссылки
- Exploit
- US Government Resource
- Exploit
- US Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 6.8 (включая)
Одно из
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*
cpe:2.3:o:windriver:vxworks:5:*:*:*:*:*:*:*
cpe:2.3:o:windriver:vxworks:5.5:*:*:*:*:*:*:*
cpe:2.3:o:windriver:vxworks:6:*:*:*:*:*:*:*
cpe:2.3:o:windriver:vxworks:6.4:*:*:*:*:*:*:*
EPSS
Процентиль: 61%
0.00411
Низкий
7.8 High
CVSS2
Дефекты
CWE-255
Связанные уязвимости
github
больше 3 лет назад
The INCLUDE_SECURITY functionality in Wind River VxWorks 6.x, 5.x, and earlier uses the LOGIN_USER_NAME and LOGIN_USER_PASSWORD (aka LOGIN_PASSWORD) parameters to create hardcoded credentials, which makes it easier for remote attackers to obtain access via a (1) telnet, (2) rlogin, or (3) FTP session.
EPSS
Процентиль: 61%
0.00411
Низкий
7.8 High
CVSS2
Дефекты
CWE-255