ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).
References
Link | Resource |
---|---|
https://www.tarlogic.com/advisories/Tarlogic-2018-002.txt | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2018-04-11 10:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-10024
Mitre link : CVE-2018-10024
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
ubiquoss
- vp5208a
- vp5208a_firmware