Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
                
            References
                    | Link | Resource | 
|---|---|
| https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers/ | Broken Link Third Party Advisory | 
| https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers/ | Broken Link Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 05:04
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers/ - Broken Link, Third Party Advisory | 
Information
                Published : 2020-08-07 22:15
Updated : 2024-11-21 05:04
NVD link : CVE-2020-15058
Mitre link : CVE-2020-15058
CVE.ORG link : CVE-2020-15058
JSON object : View
Products Affected
                lindy-international
- 42633_firmware
 - 42633
 
