← Back to CVEs
CVE-2023-0750
CRITICAL9.8
Description
Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface. When the device can be accessed over the network an attacker could bypass authentication. This would allow an attacker to : - Change the password, resulting in a DOS of the users - Change the streaming source, compromising the integrity of the stream - Change the streaming destination, compromising the confidentiality of the stream This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/6/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
lynx-technik:yellobrik_pec_1864lynx-technik:yellobrik_pec_1864_firmware
Weaknesses (CWE)
CWE-602CWE-311
References
https://support.lynx-technik.com/support/solutions/articles/1000317081-pec-1864-web-ui-for-configuration(vulnerability@ncsc.ch)
https://support.lynx-technik.com/support/solutions/articles/1000317081-pec-1864-web-ui-for-configuration(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.