QED ResourceXpress Qubi3 devices before 1.40.9 could allow a local attacker (with physical access to the device) to obtain sensitive information via the debug interface (keystrokes over a USB cable), aka wireless password visibility.
References
Link | Resource |
---|---|
https://www.resourcexpress.com/meeting-room-booking-systems/hardware/qubi3/ | Product Vendor Advisory |
https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/878641153/v1.40.9 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-11-17 06:15
Updated : 2020-11-30 12:44
NVD link : CVE-2020-25746
Mitre link : CVE-2020-25746
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
resourcexpress
- qubi3_firmware
- qubi3