Описание
In Solstice Pod before 3.3.0 (or Open4.3), the Administrator password can be enumerated using brute-force attacks via the /Config/service/initModel?password= Solstice Open Control API because there is no complexity requirement (e.g., it might be all digits or all lowercase letters).
Ссылки
- Release NotesVendor Advisory
- ExploitThird Party Advisory
- ProductVendor Advisory
- Release NotesVendor Advisory
- ExploitThird Party Advisory
- ProductVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.0.3 (исключая)
Одновременно
cpe:2.3:o:mersive:solstice_pod_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mersive:solstice_pod:-:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.00343
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-307
Связанные уязвимости
github
больше 3 лет назад
In Solstice Pod before 3.3.0 (or Open4.3), the Administrator password can be enumerated using brute-force attacks via the /Config/service/initModel?password= Solstice Open Control API because there is no complexity requirement (e.g., it might be all digits or all lowercase letters).
EPSS
Процентиль: 56%
0.00343
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-307