The admin web console implemented by the Centrality Communications (aka Aredfox) PA168 chipset and firmware 1.54 and earlier, as provided by various IP phones, does not require passwords or authentication tokens when using HTTP, which allows remote attackers to connect to existing superuser sessions and obtain sensitive information (passwords and configuration data).
References
Configurations
History
21 Nov 2024, 00:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/32966 - | |
References | () http://secunia.com/advisories/23919 - | |
References | () http://secunia.com/advisories/23936 - | |
References | () http://www.procheckup.com/Vulner_PR0614.php - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/457868/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2007/0346 - | |
References | () https://www.exploit-db.com/exploits/3189 - |
Information
Published : 2007-01-26 01:28
Updated : 2024-11-21 00:26
NVD link : CVE-2007-0528
Mitre link : CVE-2007-0528
CVE.ORG link : CVE-2007-0528
JSON object : View
Products Affected
centrality_communications
- pa168_chipset
CWE