TROYANOSYVIRUS
Retour aux CVEs

CVE-2020-10275

CRITICAL
9.8

Description

The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie6/24/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

easyrobotics:er-flexeasyrobotics:er-flex_firmwareeasyrobotics:er-liteeasyrobotics:er-lite_firmwareeasyrobotics:er-oneeasyrobotics:er-one_firmwareeasyrobotics:er200easyrobotics:er200_firmwaremobile-industrial-robots:mir100mobile-industrial-robots:mir1000mobile-industrial-robots:mir1000_firmwaremobile-industrial-robots:mir100_firmwaremobile-industrial-robots:mir200mobile-industrial-robots:mir200_firmwaremobile-industrial-robots:mir250mobile-industrial-robots:mir250_firmwaremobile-industrial-robots:mir500mobile-industrial-robots:mir500_firmwareuvd-robots:uvduvd-robots:uvd_firmware

Faiblesses (CWE)

CWE-261CWE-326

References

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.