TROYANOSYVIRUS
Volver a CVEs

CVE-2020-10275

CRITICAL
9.8

Descripcion

The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/24/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

easyrobotics:er-flexeasyrobotics:er-flex_firmwareeasyrobotics:er-liteeasyrobotics:er-lite_firmwareeasyrobotics:er-oneeasyrobotics:er-one_firmwareeasyrobotics:er200easyrobotics:er200_firmwaremobile-industrial-robots:mir100mobile-industrial-robots:mir1000mobile-industrial-robots:mir1000_firmwaremobile-industrial-robots:mir100_firmwaremobile-industrial-robots:mir200mobile-industrial-robots:mir200_firmwaremobile-industrial-robots:mir250mobile-industrial-robots:mir250_firmwaremobile-industrial-robots:mir500mobile-industrial-robots:mir500_firmwareuvd-robots:uvduvd-robots:uvd_firmware

Debilidades (CWE)

CWE-261CWE-326

Referencias

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.