Описание
RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.0.0.2019090 (включая)
Одновременно
Одно из
cpe:2.3:o:realtek:rtl8111ep-cg_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:realtek:rtl8111ep-cg_firmware:5.0.10:*:*:*:*:*:*:*
cpe:2.3:h:realtek:rtl8111ep-cg:-:*:*:*:*:*:*:*
Конфигурация 2Версия до 3.0.0.2019090 (включая)
Одновременно
Одно из
cpe:2.3:o:realtek:rtl8111fp-cg_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:realtek:rtl8111fp-cg_firmware:5.0.10:*:*:*:*:*:*:*
cpe:2.3:h:realtek:rtl8111fp-cg:-:*:*:*:*:*:*:*
EPSS
Процентиль: 45%
0.00222
Низкий
2.1 Low
CVSS3
Дефекты
CWE-798
CWE-798
Связанные уязвимости
CVSS3: 2.1
github
около 3 лет назад
RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.
EPSS
Процентиль: 45%
0.00222
Низкий
2.1 Low
CVSS3
Дефекты
CWE-798
CWE-798