2 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 14EXPL: 0

ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, ZXHN H108N use non-unique X.509 certificates and SSH host keys, which might allow remote attackers to obtain credentials or other sensitive information via a man-in-the-middle attack, passive decryption attack, or impersonating a legitimate device. ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, y ZXHN H108N utilizan certificados X.509 no únicos y claves de host SSH, lo que puede permitir a los atacantes remotos que obtengan credenciales u otra información sensible a través de un ataque Man-in-the-Middle (MitM), un ataque de descifrado pasivo o mediante la suplantación de un dispositivo legítimo. • http://www.kb.cert.org/vuls/id/566724 https://github.com/sec-consult/houseofkeys/search?p=3&q=zte&type=&utf8=%E2%9C%93 https://www.kb.cert.org/vuls/id/BLUU-A2NQYR • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 1%CPEs: 28EXPL: 1

WiMAX routers based on the MediaTek SDK (libmtk) that use a custom httpd plugin are vulnerable to an authentication bypass allowing a remote, unauthenticated attacker to gain administrator access to the device by performing an administrator password change on the device via a crafted POST request. Los routers WiMAX basados en MediaTek SDK (libmtk) que emplean un plugin httpd personalizado son vulnerables a una omisión de autenticación. Esto permite que un atacante remoto no autenticado obtenga acceso de administrador al dispositivo realizando un cambio de contraseña de administrador en el dispositivo mediante una petición POST manipulada. • http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html http://www.kb.cert.org/vuls/id/350135 https://sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170607-0_Various_WiMAX_CPEs_Authentication_Bypass_v10.txt • CWE-306: Missing Authentication for Critical Function •