BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers to access uncontrolled the login service at /webif/SecurityModule in a brute force attack. The password could be weak and default username is known as 'admin'. This is usable and part of an attack chain to gain SSH root access.
References
Link | Resource |
---|---|
https://psytester.github.io/CVE-2021-28909 | Third Party Advisory |
https://psytester.github.io/CVE-2021-28909 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://psytester.github.io/CVE-2021-28909 - Third Party Advisory |
21 Sep 2021, 13:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 9.8 |
References | (MISC) https://psytester.github.io/CVE-2021-28909 - Third Party Advisory | |
CWE | CWE-307 |
09 Sep 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-09 18:15
Updated : 2024-11-21 06:00
NVD link : CVE-2021-28909
Mitre link : CVE-2021-28909
CVE.ORG link : CVE-2021-28909
JSON object : View
Products Affected
bab-technologie
- eibport_firmware
- eibport
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts