The product is vulnerable to pass-the-hash attacks in...
Critical severity
Unreviewed
Published
Dec 6, 2024
to the GitHub Advisory Database
•
Updated Dec 6, 2024
Description
Published by the National Vulnerability Database
Dec 6, 2024
Published to the GitHub Advisory Database
Dec 6, 2024
Last updated
Dec 6, 2024
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain
full access to the device.
References