Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2013-3619

Summary
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
Published At-02 Jan, 2020 | 17:51
Updated At-06 Aug, 2024 | 16:14
Rejected At-
Credits

Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before SMT_X9_317 and firmware for Supermicro X8 generation motherboards before SMT X8 312 contain harcoded private encryption keys for the (1) Lighttpd web server SSL interface and the (2) Dropbear SSH daemon.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:certcc
Assigner Org ID:37e5125f-f79b-445b-8fad-9564f167944b
Published At:02 Jan, 2020 | 17:51
Updated At:06 Aug, 2024 | 16:14
Rejected At:
▼CVE Numbering Authority (CNA)

Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before SMT_X9_317 and firmware for Supermicro X8 generation motherboards before SMT X8 312 contain harcoded private encryption keys for the (1) Lighttpd web server SSL interface and the (2) Dropbear SSH daemon.

Affected Products
Vendor
Supermicro
Product
IPMI
Versions
Affected
  • before SMT_X9_317 and before SMT X8 312
Problem Types
TypeCWE IDDescription
textN/AOther
Type: text
CWE ID: N/A
Description: Other
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.citrix.com/article/CTX216642
x_refsource_CONFIRM
http://support.citrix.com/article/CTX216642
x_refsource_CONFIRM
https://community.rapid7.com/community/metasploit/blog/2013/11/05/supermicro-ipmi-firmware-vulnerabilities
x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/89044
x_refsource_MISC
https://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf
x_refsource_CONFIRM
Hyperlink: https://support.citrix.com/article/CTX216642
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.citrix.com/article/CTX216642
Resource:
x_refsource_CONFIRM
Hyperlink: https://community.rapid7.com/community/metasploit/blog/2013/11/05/supermicro-ipmi-firmware-vulnerabilities
Resource:
x_refsource_MISC
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/89044
Resource:
x_refsource_MISC
Hyperlink: https://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.citrix.com/article/CTX216642
x_refsource_CONFIRM
x_transferred
http://support.citrix.com/article/CTX216642
x_refsource_CONFIRM
x_transferred
https://community.rapid7.com/community/metasploit/blog/2013/11/05/supermicro-ipmi-firmware-vulnerabilities
x_refsource_MISC
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/89044
x_refsource_MISC
x_transferred
https://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.citrix.com/article/CTX216642
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.citrix.com/article/CTX216642
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://community.rapid7.com/community/metasploit/blog/2013/11/05/supermicro-ipmi-firmware-vulnerabilities
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/89044
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cret@cert.org
Published At:02 Jan, 2020 | 18:15
Updated At:15 Jan, 2020 | 14:08

Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before SMT_X9_317 and firmware for Supermicro X8 generation motherboards before SMT X8 312 contain harcoded private encryption keys for the (1) Lighttpd web server SSL interface and the (2) Dropbear SSH daemon.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

supermicro
supermicro
>>smt_x9_firmware>>Versions before 3.15(exclusive)
cpe:2.3:o:supermicro:smt_x9_firmware:*:*:*:*:*:*:*:*
supermicro
supermicro
>>sh7758>>-
cpe:2.3:h:supermicro:sh7758:-:*:*:*:*:*:*:*
supermicro
supermicro
>>smt_x8_firmware>>Versions before 3.12(exclusive)
cpe:2.3:o:supermicro:smt_x8_firmware:*:*:*:*:*:*:*:*
supermicro
supermicro
>>sh7757>>-
cpe:2.3:h:supermicro:sh7757:-:*:*:*:*:*:*:*
Citrix (Cloud Software Group, Inc.)
citrix
>>netscaler_sdx_firmware>>10
cpe:2.3:o:citrix:netscaler_sdx_firmware:10:*:*:*:*:*:*:*
Citrix (Cloud Software Group, Inc.)
citrix
>>netscaler_sdx>>-
cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*
Citrix (Cloud Software Group, Inc.)
citrix
>>netscaler_firmware>>-
cpe:2.3:o:citrix:netscaler_firmware:-:*:*:*:*:*:*:*
Citrix (Cloud Software Group, Inc.)
citrix
>>netscaler>>-
cpe:2.3:h:citrix:netscaler:-:*:*:*:*:*:*:*
Citrix (Cloud Software Group, Inc.)
citrix
>>netscaler_sd-wan_firmware>>-
cpe:2.3:o:citrix:netscaler_sd-wan_firmware:-:*:*:*:*:*:*:*
Citrix (Cloud Software Group, Inc.)
citrix
>>netscaler_sd-wan>>-
cpe:2.3:h:citrix:netscaler_sd-wan:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-798Primarynvd@nist.gov
CWE ID: CWE-798
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://support.citrix.com/article/CTX216642cret@cert.org
Third Party Advisory
https://community.rapid7.com/community/metasploit/blog/2013/11/05/supermicro-ipmi-firmware-vulnerabilitiescret@cert.org
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/89044cret@cert.org
Third Party Advisory
VDB Entry
https://support.citrix.com/article/CTX216642cret@cert.org
Third Party Advisory
https://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdfcret@cert.org
Vendor Advisory
Hyperlink: http://support.citrix.com/article/CTX216642
Source: cret@cert.org
Resource:
Third Party Advisory
Hyperlink: https://community.rapid7.com/community/metasploit/blog/2013/11/05/supermicro-ipmi-firmware-vulnerabilities
Source: cret@cert.org
Resource:
Third Party Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/89044
Source: cret@cert.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://support.citrix.com/article/CTX216642
Source: cret@cert.org
Resource:
Third Party Advisory
Hyperlink: https://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf
Source: cret@cert.org
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

67Records found

CVE-2024-9594
Matching Score-4
Assigner-Kubernetes
ShareView Details
Matching Score-4
Assigner-Kubernetes
CVSS Score-6.3||MEDIUM
EPSS-0.33% / 55.27%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 20:37
Updated-08 Nov, 2024 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
VM images built with Image Builder with some providers use default credentials during builds

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project. Because these images were vulnerable during the image build process, they are affected only if an attacker was able to reach the VM where the image build was happening and used the vulnerability to modify the image at the time the image build was occurring.

Action-Not Available
Vendor-Kubernetes
Product-image_builderImage Builderimage_builder
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2019-10990
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.98%
||
7 Day CHG~0.00%
Published-23 Sep, 2019 | 15:46
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files.

Action-Not Available
Vendor-redlionn/a
Product-crimsonRed Lion Controls Crimson (Windows configuration software)
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2018-9195
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.30% / 52.54%
||
7 Day CHG~0.00%
Published-21 Nov, 2019 | 14:59
Updated-25 Oct, 2024 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle with knowledge of the key to eavesdrop on and modify information (URL/SPAM services in FortiOS 5.6, and URL/SPAM/AV services in FortiOS 6.0.; URL rating in FortiClient) sent and received from Fortiguard severs by decrypting these messages. Affected products include FortiClient for Windows 6.0.6 and below, FortiOS 6.0.7 and below, FortiClient for Mac OS 6.2.1 and below.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientfortiosFortiOSFortiClient for Mac OSFortiClient for Windows
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2018-9073
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-5.9||MEDIUM
EPSS-0.15% / 35.94%
||
7 Day CHG~0.00%
Published-16 Nov, 2018 | 14:00
Updated-05 Aug, 2024 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CMM Security Vulnerability

Lenovo Chassis Management Module (CMM) prior to version 2.0.0 utilizes a hardcoded encryption key to protect certain secrets. Possession of the key can allow an attacker that has already compromised the server to decrypt these secrets.

Action-Not Available
Vendor-Lenovo Group Limited
Product-chassis_management_module_firmwarechassis_management_moduleChassis Management Module (CMM)
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-20773
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.23% / 78.36%
||
7 Day CHG~0.00%
Published-21 Apr, 2022 | 18:55
Updated-06 Nov, 2024 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Umbrella Virtual Appliance Static SSH Host Key Vulnerability

A vulnerability in the key-based SSH authentication mechanism of Cisco Umbrella Virtual Appliance (VA) could allow an unauthenticated, remote attacker to impersonate a VA. This vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a man-in-the-middle attack on an SSH connection to the Umbrella VA. A successful exploit could allow the attacker to learn the administrator credentials, change configurations, or reload the VA. Note: SSH is not enabled by default on the Umbrella VA.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-umbrellaCisco Umbrella Insights Virtual Appliance
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-21199
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.05%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:10
Updated-15 Apr, 2025 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability exists due to the hardcoded TLS key of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted man-in-the-middle attack can lead to a disclosure of sensitive information. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.

Action-Not Available
Vendor-n/aReolink Innovation Limited
Product-rlc-410w_firmwarerlc-410wn/a
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2018-16546
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.34% / 56.08%
||
7 Day CHG~0.00%
Published-05 Sep, 2018 | 20:00
Updated-16 Sep, 2024 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Amcrest networked devices use the same hardcoded SSL private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation, as demonstrated by Amcrest_IPC-HX1X3X-LEXUS_Eng_N_AMCREST_V2.420.AC01.3.R.20180206.

Action-Not Available
Vendor-n/aAmcrest Industries LLC.
Product-amcrest_ipc-hx1x3x-lexus_eng_n_amcrestn/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2018-12240
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-5.9||MEDIUM
EPSS-0.31% / 53.37%
||
7 Day CHG~0.00%
Published-29 Aug, 2018 | 20:00
Updated-16 Sep, 2024 | 23:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Norton Identity Safe product prior to 5.3.0.976 may be susceptible to a privilege escalation issue via a hard coded IV, which is a type of vulnerability that can potentially increase the likelihood of encrypted data being recovered without adequate credentials.

Action-Not Available
Vendor-Symantec Corporation
Product-norton_password_managerNorton Identity Safe for Android
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-44207
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-11.85% / 93.47%
||
7 Day CHG~0.00%
Published-21 Dec, 2021 | 17:45
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-01-13||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Please contact the product developer for support and vulnerability mitigation.

Acclaim USAHERDS through 7.4.0.1 uses hard-coded credentials.

Action-Not Available
Vendor-n/aAcclaim Systems
Product-usaherdsn/aUSAHERDS
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-42635
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-23.53% / 95.76%
||
7 Day CHG~0.00%
Published-31 Jan, 2022 | 17:54
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution.

Action-Not Available
Vendor-printerlogicn/aLinux Kernel Organization, IncApple Inc.
Product-macoslinux_kernelweb_stackn/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2017-7648
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.62% / 69.13%
||
7 Day CHG~0.00%
Published-10 Apr, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foscam networked devices use the same hardcoded SSL private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.

Action-Not Available
Vendor-foscamn/a
Product-fi9851pfi9800xefi9853epr2c1_litec2fi9901epfi9828pfi9928pfi9903pfi9826pc1n/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-31151
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.19% / 41.35%
||
7 Day CHG+0.03%
Published-30 Oct, 2024 | 13:35
Updated-13 Nov, 2024 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security flaw involving hard-coded credentials in LevelOne WBR-6012's web services allows attackers to gain unauthorized access during the first 30 seconds post-boot. Other vulnerabilities can force a reboot, circumventing the initial time restriction for exploitation.The password string can be found at addresses 0x 803cdd0f and 0x803da3e6: 803cdd0f 41 72 69 65 ds "AriesSerenaCairryNativitaMegan" 73 53 65 72 65 6e 61 43 ... It is referenced by the function at 0x800b78b0 and simplified in the pseudocode below: if (is_equal = strcmp(password,"AriesSerenaCairryNativitaMegan"){ ret = 3;} Where 3 is the return value to user-level access (0 being fail and 1 being admin/backdoor). While there's no legitimate functionality to change this password, once authenticated it is possible manually make a change by taking advantage of TALOS-2024-XXXXX using HTTP POST paramater "Pu" (new user password) in place of "Pa" (new admin password).

Action-Not Available
Vendor-level1LevelOne
Product-wbr-6012_firmwarewbr-6012WBR-6012
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-3565
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.19% / 41.31%
||
7 Day CHG~0.00%
Published-04 Jun, 2021 | 11:39
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.

Action-Not Available
Vendor-tpm2-tools_projectn/aRed Hat, Inc.Fedora Project
Product-enterprise_linuxfedoratpm2-toolstpm2-tools
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-30165
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.93%
||
7 Day CHG~0.00%
Published-27 Apr, 2021 | 03:07
Updated-17 Sep, 2024 | 00:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EDIMAX Technology Co., Ltd. HD Wireless Day & Night Network Camera IC-3140W - Hard-coded password

The default administrator account & password of the EDIMAX wireless network camera is hard-coded. Remote attackers can disassemble firmware to obtain the privileged permission and further control the devices.

Action-Not Available
Vendor-Edimax Technology Company Ltd.
Product-ic-3140wic-3140w_firmwareIC-3140W
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-34151
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.1||HIGH
EPSS-1.45% / 79.97%
||
7 Day CHG~0.00%
Published-04 Jul, 2022 | 01:51
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller.

Action-Not Available
Vendor-omronOMRON Corporation
Product-nx1p2-1040dt_firmwarenj501-4300_firmwarenx701-1620_firmwarenj501-4500_firmwarenx1w-cif01_firmwarenj501-r320nj501-5300nx701-1600nx1w-adb21nj501-r320_firmwarenx102-1220nj501-r300nj101-1020_firmwarena5-12wnx102-1200_firmwarenx102-1100nx1p2-9024dt_firmwarenx1p2-1040dt1na5-12w_firmwarenx1p2-9024dtna5-9wnx701-1700nj501-r420_firmwarenx1w-cif11_firmwarenj501-1300nj501-1420_firmwarenj501-5300_firmwarenx1w-dab21vnj101-1020nj501-r420nx1w-adb21_firmwarenx701-z700nx1p2-1140dt1_firmwarenx102-1120nx1p2-1040dt1_firmwarenj501-4500nx102-1000_firmwarenx102-1000nj-pa3001_firmwarenx102-9020_firmwarenx1w-dab21v_firmwarenj501-1500_firmwarenx701-1720_firmwarenx1w-mab221_firmwarenj101-1000nj-pd3001na5-7wnx1w-mab221na5-15w_firmwarenx102-1100_firmwarenj501-1340nx701-z600_firmwarenj501-1320_firmwarena5-7w_firmwarenx1p2-1140dt_firmwarenx1p2-1040dtnx1p2-1140dt1nx102-1020_firmwarenj501-1420nj501-4310_firmwarenj501-r500_firmwarenx701-1720sysmac_studiona5-9w_firmwarenj501-4320nj501-1500nx1w-cif12_firmwarenj501-140_firmwarenj501-4400nx1w-cif11nj501-r520nj501-140nx701-1600_firmwarenj501-1520nx102-1120_firmwarenj301-1100_firmwarena5-15wnj501-4320_firmwarenj501-r400_firmwarenx1w-cif01nj501-1300_firmwarenj-pa3001nx102-1220_firmwarenj501-4300nj301-1100nj501-4400_firmwarenj101-1000_firmwarenj101-9020_firmwarenx701-1700_firmwarenj301-1200nx102-9020nj-pd3001_firmwarenx701-z600nj101-9000nj501-r500nj501-1320nj501-1340_firmwarenj301-1200_firmwarenj501-1520_firmwarenx1p2-1140dtnx701-z700_firmwarenx1w-cif12nj501-r400nx1p2-9024dt1nx102-1020nx102-1200nj501-r520_firmwarenj101-9020nj501-4310nx701-1620nx1p2-9024dt1_firmwarenj501-r300_firmwarenj101-9000_firmwareMachine automation controller NJ series, Machine automation controller NX series, Automation software 'Sysmac Studio', and Programmable Terminal (PT) NA series
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-15314
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.29% / 51.71%
||
7 Day CHG~0.00%
Published-29 Jun, 2020 | 15:02
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded RSA SSH key for the root account.

Action-Not Available
Vendor-n/aZyxel Networks Corporation
Product-cloudcnm_secumanagern/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-0266
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-8.1||HIGH
EPSS-0.42% / 61.24%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 19:37
Updated-17 Sep, 2024 | 03:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
cSRX: Use of Hard-coded Cryptographic Keys allows an attacker to take control of the device through device management services.

The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services. This issue affects: Juniper Networks Junos OS on cSRX Series: All versions prior to 20.2R3; 20.3 versions prior to 20.3R2; 20.4 versions prior to 20.4R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junoscsrxJunos OS
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
  • Previous
  • 1
  • 2
  • Next
Details not found