WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the 'forgot password' feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access.
References
Link | Resource |
---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-021.txt | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Jul/9 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/153530/WolfVision-Cynap-1.18g-1.28j-Hardcoded-Credential.html | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-07-05 13:15
Updated : 2019-07-15 09:03
NVD link : CVE-2019-13352
Mitre link : CVE-2019-13352
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
wolfvision
- cynap