BAB TECHNOLOGIE GmbH eibPort V3. Each device has its own unique hard coded and weak root SSH key passphrase known as 'eibPort string'. This is usable and the final part of an attack chain to gain SSH root access.
References
Link | Resource |
---|---|
https://psytester.github.io/CVE-2021-28912 | Third Party Advisory |
https://psytester.github.io/CVE-2021-28912 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://psytester.github.io/CVE-2021-28912 - Third Party Advisory |
20 Sep 2021, 20:29
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 CWE-521 |
|
CPE | cpe:2.3:o:bab-technologie:eibport_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:bab-technologie:eibport:v3:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 7.2 |
References | (MISC) https://psytester.github.io/CVE-2021-28912 - Third Party Advisory |
09 Sep 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-09 18:15
Updated : 2024-11-21 06:00
NVD link : CVE-2021-28912
Mitre link : CVE-2021-28912
CVE.ORG link : CVE-2021-28912
JSON object : View
Products Affected
bab-technologie
- eibport_firmware
- eibport