Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-5490

Summary
Assigner-netapp
Assigner Org ID-11fdca00-0482-4c88-a206-37f9c182c87d
Published At-21 Mar, 2019 | 18:25
Updated At-04 Aug, 2024 | 19:54
Rejected At-
Credits

Certain versions between 2.x to 5.x (refer to advisory) of the NetApp Service Processor firmware were shipped with a default account enabled that could allow unauthorized arbitrary command execution. Any platform listed in the advisory Impact section may be affected and should be upgraded to a fixed version of Service Processor firmware IMMEDIATELY.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:netapp
Assigner Org ID:11fdca00-0482-4c88-a206-37f9c182c87d
Published At:21 Mar, 2019 | 18:25
Updated At:04 Aug, 2024 | 19:54
Rejected At:
▼CVE Numbering Authority (CNA)

Certain versions between 2.x to 5.x (refer to advisory) of the NetApp Service Processor firmware were shipped with a default account enabled that could allow unauthorized arbitrary command execution. Any platform listed in the advisory Impact section may be affected and should be upgraded to a fixed version of Service Processor firmware IMMEDIATELY.

Affected Products
Vendor
NetApp, Inc.NetApp, Inc.
Product
NetApp Service Processor
Versions
Affected
  • 2.x-5.x - refer to advisory
Problem Types
TypeCWE IDDescription
textN/ADefault Configureation
Type: text
CWE ID: N/A
Description: Default Configureation
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.netapp.com/advisory/ntap-20190305-0001/
x_refsource_CONFIRM
http://support.lenovo.com/us/en/solutions/LEN-26771
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20190305-0001/
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.lenovo.com/us/en/solutions/LEN-26771
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.netapp.com/advisory/ntap-20190305-0001/
x_refsource_CONFIRM
x_transferred
http://support.lenovo.com/us/en/solutions/LEN-26771
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20190305-0001/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.lenovo.com/us/en/solutions/LEN-26771
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-alert@netapp.com
Published At:21 Mar, 2019 | 19:29
Updated At:24 Aug, 2020 | 17:37

Certain versions between 2.x to 5.x (refer to advisory) of the NetApp Service Processor firmware were shipped with a default account enabled that could allow unauthorized arbitrary command execution. Any platform listed in the advisory Impact section may be affected and should be upgraded to a fixed version of Service Processor firmware IMMEDIATELY.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.09.8CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.0
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

NetApp, Inc.
netapp
>>service_processor>>2.8
cpe:2.3:a:netapp:service_processor:2.8:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.7
cpe:2.3:a:netapp:service_processor:3.7:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.5
cpe:2.3:a:netapp:service_processor:4.5:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.5
cpe:2.3:a:netapp:service_processor:5.5:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>clustered_data_ontap>>9.5
cpe:2.3:o:netapp:clustered_data_ontap:9.5:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.8
cpe:2.3:a:netapp:service_processor:2.8:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.7
cpe:2.3:a:netapp:service_processor:3.7:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.5
cpe:2.3:a:netapp:service_processor:4.5:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.5
cpe:2.3:a:netapp:service_processor:5.5:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>clustered_data_ontap>>9.4
cpe:2.3:o:netapp:clustered_data_ontap:9.4:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.8
cpe:2.3:a:netapp:service_processor:2.8:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.7
cpe:2.3:a:netapp:service_processor:3.7:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.5
cpe:2.3:a:netapp:service_processor:4.5:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.5
cpe:2.3:a:netapp:service_processor:5.5:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>clustered_data_ontap>>9.3
cpe:2.3:o:netapp:clustered_data_ontap:9.3:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.5
cpe:2.3:a:netapp:service_processor:2.5:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.4
cpe:2.3:a:netapp:service_processor:3.4:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.4
cpe:2.3:a:netapp:service_processor:3.4:patch1:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.4
cpe:2.3:a:netapp:service_processor:3.4:patch2:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.2
cpe:2.3:a:netapp:service_processor:4.2:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.2
cpe:2.3:a:netapp:service_processor:4.2:patch1:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.2
cpe:2.3:a:netapp:service_processor:4.2:patch2:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.2
cpe:2.3:a:netapp:service_processor:5.2:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.2
cpe:2.3:a:netapp:service_processor:5.2:patch1:*:*:*:*:*:*
NetApp, Inc.
netapp
>>clustered_data_ontap>>9.2
cpe:2.3:o:netapp:clustered_data_ontap:9.2:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.4.1
cpe:2.3:a:netapp:service_processor:2.4.1:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.4.1
cpe:2.3:a:netapp:service_processor:2.4.1:patch1:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.3
cpe:2.3:a:netapp:service_processor:3.3:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.3
cpe:2.3:a:netapp:service_processor:3.3:patch1:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.3
cpe:2.3:a:netapp:service_processor:3.3:patch2:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.3
cpe:2.3:a:netapp:service_processor:3.3:patch3:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.3
cpe:2.3:a:netapp:service_processor:3.3:patch4:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.1
cpe:2.3:a:netapp:service_processor:4.1:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.1
cpe:2.3:a:netapp:service_processor:4.1:patch1:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.1
cpe:2.3:a:netapp:service_processor:4.1:patch2:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.1
cpe:2.3:a:netapp:service_processor:4.1:patch3:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.1
cpe:2.3:a:netapp:service_processor:4.1:patch4:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.1
cpe:2.3:a:netapp:service_processor:4.1:patch5:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>4.1
cpe:2.3:a:netapp:service_processor:4.1:patch6:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.1
cpe:2.3:a:netapp:service_processor:5.1:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.1
cpe:2.3:a:netapp:service_processor:5.1:patch1:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.1
cpe:2.3:a:netapp:service_processor:5.1:patch2:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>5.1
cpe:2.3:a:netapp:service_processor:5.1:patch3:*:*:*:*:*:*
NetApp, Inc.
netapp
>>clustered_data_ontap>>9.1
cpe:2.3:o:netapp:clustered_data_ontap:9.1:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.4
cpe:2.3:a:netapp:service_processor:2.4:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>3.2
cpe:2.3:a:netapp:service_processor:3.2:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>clustered_data_ontap>>9.0
cpe:2.3:o:netapp:clustered_data_ontap:9.0:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.3.2
cpe:2.3:a:netapp:service_processor:2.3.2:-:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.3.2
cpe:2.3:a:netapp:service_processor:2.3.2:patch1:*:*:*:*:*:*
NetApp, Inc.
netapp
>>service_processor>>2.3.2
cpe:2.3:a:netapp:service_processor:2.3.2:patch2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1188Primarynvd@nist.gov
CWE ID: CWE-1188
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://support.lenovo.com/us/en/solutions/LEN-26771security-alert@netapp.com
N/A
https://security.netapp.com/advisory/ntap-20190305-0001/security-alert@netapp.com
Vendor Advisory
Hyperlink: http://support.lenovo.com/us/en/solutions/LEN-26771
Source: security-alert@netapp.com
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20190305-0001/
Source: security-alert@netapp.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

68Records found

CVE-2021-42109
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.62% / 69.16%
||
7 Day CHG~0.00%
Published-08 Oct, 2021 | 17:45
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VITEC Exterity IPTV products through 2021-04-30 allow privilege escalation to root.

Action-Not Available
Vendor-vitecn/a
Product-avediastream_m9405_firmwareavediastream_r9310_firmwareavediastream_r9310avediastream_m9325avediastream_r9350_firmwareavediastream_r9350exterity_avediaserveravediastream_m9400avediastream_m9305exterity_avediastream_encodersavediastream_m9325_firmwareavediastream_m9405exterity_avediastream_encoders_firmwareavediastream_m9605avediastream_m9305_firmwareavediastream_r9300avediastream_m9605_firmwareavediastream_r9300_firmwareavediastream_m9400_firmwaren/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2017-7964
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-2.71% / 85.33%
||
7 Day CHG~0.00%
Published-19 Apr, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zyxel WRE6505 devices have a default TELNET password of 1234 for the root and admin accounts, which makes it easier for remote attackers to conduct DNS hijacking attacks by reconfiguring the built-in dnshijacker process.

Action-Not Available
Vendor-n/aZyxel Networks Corporation
Product-wre6505_firmwaren/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2017-5178
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-2.54% / 84.89%
||
7 Day CHG~0.00%
Published-08 Mar, 2017 | 08:37
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonderware Intelligence Versions 2014R3 and prior. These versions contain a system account that is installed by default. The default system account is difficult to configure with non-default credentials after installation, and changing the default credentials in the embedded Tableau Server is not documented. If Tableau Server is used with Windows integrated security (Active Directory), the software is not vulnerable. However, when Tableau Server is used with local authentication mode, the software is vulnerable. The default system account could be used to gain unauthorized access.

Action-Not Available
Vendor-n/aSchneider Electric SE
Product-tableau_desktopwonderware_intelligencetableau_serverSchneider Electric Wonderware Intelligence 2014R3 and prior
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2020-11532
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-89.83% / 99.55%
||
7 Day CHG~0.00%
Published-08 May, 2020 | 20:02
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho ManageEngine DataSecurity Plus prior to 6.0.1 uses default admin credentials to communicate with a DataEngine Xnode server. This allows an attacker to bypass authentication for this server and execute all operations in the context of admin user.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_datasecurity_plusmanageengine_adaudit_plusn/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2017-3834
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-6.23% / 90.52%
||
7 Day CHG~0.00%
Published-06 Apr, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points running Cisco Mobility Express Software could allow an unauthenticated, remote attacker to take complete control of an affected device. The vulnerability is due to the existence of default credentials for an affected device that is running Cisco Mobility Express Software, regardless of whether the device is configured as a master, subordinate, or standalone access point. An attacker who has layer 3 connectivity to an affected device could use Secure Shell (SSH) to log in to the device with elevated privileges. A successful exploit could allow the attacker to take complete control of the device. This vulnerability affects Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points that are running an 8.2.x release of Cisco Mobility Express Software prior to Release 8.2.111.0, regardless of whether the device is configured as a master, subordinate, or standalone access point. Release 8.2 was the first release of Cisco Mobility Express Software for next generation Cisco Aironet Access Points. Cisco Bug IDs: CSCva50691.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-aironet_access_point_firmwareaironet_1850e_access_pointaironet_1830i_access_pointaironet_1850i_access_pointCisco Aironet 1830 Series and 1850 Series Access Points
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CWE ID-CWE-255
Not Available
CVE-2021-38759
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-44.55% / 97.48%
||
7 Day CHG~0.00%
Published-07 Dec, 2021 | 20:51
Updated-04 Aug, 2024 | 01:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Raspberry Pi OS through 5.10 has the raspberry default password for the pi account. If not changed, attackers can gain administrator privileges.

Action-Not Available
Vendor-raspberrypin/a
Product-raspberry_pi_os_liten/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2021-35965
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.80% / 82.05%
||
7 Day CHG~0.00%
Published-19 Jul, 2021 | 11:55
Updated-17 Sep, 2024 | 01:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Learningdigital.com, Inc. Orca HCM - Hard-code password

The Orca HCM digital learning platform uses a weak factory default administrator password, which is hard-coded in the source code of the webpage in plain text, thus remote attackers can obtain administrator’s privilege without logging in.

Action-Not Available
Vendor-learningdigitalLearningdigital.com, Inc.
Product-orca_hcmOrca HCM
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-1804
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-7.26% / 91.27%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 16:25
Updated-19 Nov, 2024 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Default SSH Key Vulnerability

A vulnerability in the SSH key management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user. The vulnerability is due to the presence of a default SSH key pair that is present in all devices. An attacker could exploit this vulnerability by opening an SSH connection via IPv6 to a targeted device using the extracted key materials. An exploit could allow the attacker to access the system with the privileges of the root user. This vulnerability is only exploitable over IPv6; IPv4 is not vulnerable.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_9372px_firmwarenexus_9332pqnexus_93108tc-exnexus_9396pxnexus_93108tc-ex_firmwarenexus_9508nexus_9372pxnexus_9504_firmwarenexus_93120txnexus_9516_firmwarenexus_93128txnexus_93120tx_firmwarenexus_9508_firmwarenexus_9372txnexus_9504nexus_9500nexus_9372tx_firmwarenexus_93180yc-ex_firmwarenexus_9396tx_firmwarenexus_93180yc-exnexus_9500_firmwarenexus_9396txnexus_9516nexus_9396px_firmwarenexus_9332pq_firmwarenexus_93128tx_firmwareCisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode 11.0.1b
CWE ID-CWE-310
Not Available
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2018-3591
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.34%
||
7 Day CHG~0.00%
Published-11 Apr, 2018 | 15:00
Updated-17 Sep, 2024 | 02:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9650, MDM9655, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, Snapdragon_High_Med_2016, the default build configuration of deviceprogrammer in BOOT.BF.3.0 enables the flag SKIP_SECBOOT_CHECK_NOT_RECOMMENDED_BY_QUALCOMM which will open up the peek and poke commands to any memory location on the target.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_427_firmwaremdm9635m_firmwaresd_412sdm636_firmwaresd_415sd_616sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_615mdm9655_firmwaremdm9650sd_650_firmwaresd_435sd_625sd_615_firmwaresdm630sd_210mdm9607sd_820_firmwaresd_820sd_650sd_450_firmwaresd_845_firmwaresd_410mdm9206sd_652sd_425_firmwaresd_212_firmwaresd_625_firmwaresd_450mdm9655sdm636sd_412_firmwaremdm9635msdm630_firmwaresd_845mdm9206_firmwaresd_430sd_427sd_435_firmwaresd_835_firmwaremdm9650_firmwaresd_410_firmwaresd_835sd_205sd_210_firmwaresd_415_firmwaresd_652_firmwaresd_616_firmwaresd_205_firmwaresdm660_firmwaresd_212Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-7252
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.40% / 60.01%
||
7 Day CHG~0.00%
Published-02 Jul, 2019 | 18:54
Updated-04 Aug, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linear eMerge E3-Series devices have Default Credentials.

Action-Not Available
Vendor-nortekcontroln/a
Product-linear_emerge_essential_firmwarelinear_emerge_elitelinear_emerge_elite_firmwarelinear_emerge_essentialn/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-7668
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.34% / 56.37%
||
7 Day CHG~0.00%
Published-01 Jul, 2019 | 18:20
Updated-04 Aug, 2024 | 20:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Prima Systems FlexAir devices have Default Credentials.

Action-Not Available
Vendor-primasystemsn/a
Product-flexairn/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-5367
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-20.37% / 95.32%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 14:45
Updated-04 Aug, 2024 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_centerHPE Intelligent Management Center (IMC) PLAT
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-16102
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 61.94%
||
7 Day CHG~0.00%
Published-08 Sep, 2019 | 16:37
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Silver Peak EdgeConnect SD-WAN before 8.1.7.x has an SNMP service with a public value for rocommunity and trapcommunity.

Action-Not Available
Vendor-silver-peakn/a
Product-unity_edgeconnect_sd-wan_firmwareunity_edgeconnect_sd-wann/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-3909
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.16% / 77.70%
||
7 Day CHG~0.00%
Published-18 Jan, 2019 | 18:00
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.

Action-Not Available
Vendor-identicardn/a
Product-premisys_idPremisys Identicard 3.1.190
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-14222
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.58% / 84.99%
||
7 Day CHG~0.00%
Published-05 Sep, 2019 | 21:13
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Alfresco Community Edition versions 6.0 and lower. An unauthenticated, remote attacker could authenticate to Alfresco's Solr Web Admin Interface. The vulnerability is due to the presence of a default private key that is present in all default installations. An attacker could exploit this vulnerability by using the extracted private key and bundling it into a PKCS12. A successful exploit could allow the attacker to gain information about the target system (e.g., OS type, system file locations, Java version, Solr version, etc.) as well as the ability to launch further attacks by leveraging the access to Alfresco's Solr Web Admin Interface.

Action-Not Available
Vendor-alfrescon/a
Product-alfrescon/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2017-12739
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-3.14% / 86.37%
||
7 Day CHG~0.00%
Published-15 Nov, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow unauthenticated remote attackers to execute arbitrary code on the affected device.

Action-Not Available
Vendor-n/aSiemens AG
Product-sm-2556sm-2556_firmwareSiemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-11618
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.84% / 73.79%
||
7 Day CHG~0.00%
Published-30 Apr, 2019 | 19:40
Updated-04 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

doorGets 7.0 has a default administrator credential vulnerability. A remote attacker can use this vulnerability to gain administrator privileges for the creation and modification of articles via an H0XZlT44FcN1j9LTdFc5XRXhlF30UaGe1g3cZY6i1K9 access_token in a uri=blog&action=index&controller=blog action to /api/index.php.

Action-Not Available
Vendor-doorgetsn/a
Product-doorgets_cmsn/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2018-5770
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.85% / 87.75%
||
7 Day CHG~0.00%
Published-20 Mar, 2018 | 15:00
Updated-05 Aug, 2024 | 05:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Tenda AC15 devices. A remote, unauthenticated attacker can make a request to /goform/telnet, creating a telnetd service on the device. This service is password protected; however, several default accounts exist on the device that are root accounts, which can be used to log in.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-ac15_firmwareac15n/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
  • Previous
  • 1
  • 2
  • Next
Details not found