Описание
Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M have a default password of admin for the admin account, which allows remote attackers to obtain web-management access by leveraging the ability to authenticate from the intranet.
Ссылки
- PatchThird Party AdvisoryUS Government Resource
- PatchThird Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до al1-r201exp10-l304-w33 (включая)
Одновременно
cpe:2.3:o:securifi:almond_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:securifi:almond:*:*:*:*:*:*:*:*
Конфигурация 2Версия до al2-r088 (включая)
Одновременно
cpe:2.3:o:securifi:almond-2015_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:securifi:almond-2015:*:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.00294
Низкий
7.3 High
CVSS2
Дефекты
CWE-255
Связанные уязвимости
github
больше 3 лет назад
Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M have a default password of admin for the admin account, which allows remote attackers to obtain web-management access by leveraging the ability to authenticate from the intranet.
EPSS
Процентиль: 52%
0.00294
Низкий
7.3 High
CVSS2
Дефекты
CWE-255