TROYANOSYVIRUS
Volver a CVEs

CVE-2018-11682

CRITICAL
9.8

Descripcion

Default and unremovable support credentials allow attackers to gain total super user control of an IoT device through a TELNET session to products using the Stanza Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/2/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

lutron:homeworks_qslutron:homeworks_qs_firmwarelutron:radiora_2lutron:radiora_2_firmwarelutron:stanzalutron:stanza_firmware

Debilidades (CWE)

CWE-798CWE-798

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.