Логотип exploitDog
bind:CVE-2019-13352
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13352

Количество 2

Количество 2

nvd логотип

CVE-2019-13352

больше 6 лет назад

WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the 'forgot password' feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-68qm-wh67-jrc3

больше 3 лет назад

WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the 'forgot password' feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-13352

WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the 'forgot password' feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access.

CVSS3: 9.8
1%
Низкий
больше 6 лет назад
github логотип
GHSA-68qm-wh67-jrc3

WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the 'forgot password' feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу