Описание
KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Ссылки
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- ProductVendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- ProductVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.7.6 (включая)
cpe:2.3:a:knx:engineering_tool_software_5:*:*:*:*:*:*:*:*
EPSS
Процентиль: 33%
0.00128
Низкий
8.8 High
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-798
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
KNX ETS5 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev.
EPSS
Процентиль: 33%
0.00128
Низкий
8.8 High
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-798