TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2020-10275

CRITICAL
9.8

Beschreibung

The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/24/2020
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

easyrobotics:er-flexeasyrobotics:er-flex_firmwareeasyrobotics:er-liteeasyrobotics:er-lite_firmwareeasyrobotics:er-oneeasyrobotics:er-one_firmwareeasyrobotics:er200easyrobotics:er200_firmwaremobile-industrial-robots:mir100mobile-industrial-robots:mir1000mobile-industrial-robots:mir1000_firmwaremobile-industrial-robots:mir100_firmwaremobile-industrial-robots:mir200mobile-industrial-robots:mir200_firmwaremobile-industrial-robots:mir250mobile-industrial-robots:mir250_firmwaremobile-industrial-robots:mir500mobile-industrial-robots:mir500_firmwareuvd-robots:uvduvd-robots:uvd_firmware

Schwachen (CWE)

CWE-261CWE-326

Referenzen

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.