5 results (0.011 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords. • https://www.twcert.org.tw/tw/cp-132-8059-bde5f-1.html https://www.twcert.org.tw/en/cp-139-8060-f3955-2.html • CWE-261: Weak Encoding for Password •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The swctrl service is used to detect and remotely manage PLANET Technology devices. Certain switch models have a Denial-of-Service vulnerability in the swctrl service, allowing unauthenticated remote attackers to send crafted packets that can crash the service. • https://www.twcert.org.tw/tw/cp-132-8057-1b3fa-1.html https://www.twcert.org.tw/en/cp-139-8058-cc391-2.html • CWE-400: Uncontrolled Resource Consumption CWE-476: NULL Pointer Dereference •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

The administration interface in the Planet VC-200M VDSL2 router allows remote attackers to cause a denial of service (administration interface outage) via an HTTP request without a Host header. La interfaz de administración del enrutador Planet VC-200M VDSL2 permite a atacantes remotos provocar una denegación de servicio (parada de la interfaz de administración) mediante una petición HTTP sin la cabecera Host. • http://secunia.com/advisories/26559 http://securityvulns.com/news/Planet/VC-200M/DoS.html http://securityvulns.ru/Rdocument847.html http://www.securityfocus.com/archive/1/477253/100/0/threaded http://www.securityfocus.com/bid/25390 https://exchange.xforce.ibmcloud.com/vulnerabilities/36155 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Planet Technology Corp FGSW2402RS switch with firmware 1.2 has a default password, which allows attackers with physical access to the device's serial port to gain privileges. • http://marc.info/?l=bugtraq&m=112861552020302&w=2 http://securityreason.com/securityalert/53 http://www.securityfocus.com/bid/15014 •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

Planet Technology WGSD-1020 and WSW-2401 Ethernet switches use a default "superuser" account with the "planet" password, which allows remote attackers to gain administrative access. • http://securitytracker.com/id?1007924 http://www.securityfocus.com/archive/1/341329 http://www.securityfocus.com/bid/8837 https://exchange.xforce.ibmcloud.com/vulnerabilities/13446 •