CVE-2024-8455

The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:planet:gs-4210-24p2s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:planet:gs-4210-24p2s:3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:planet:gs-4210-24pl4c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:planet:gs-4210-24pl4c:2.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:planet:igs-5225-4up1t2s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:planet:igs-5225-4up1t2s:1.0:*:*:*:*:*:*:*

History

04 Oct 2024, 14:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 5.9
CWE CWE-326
CPE cpe:2.3:o:planet:igs-5225-4up1t2s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:planet:gs-4210-24pl4c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:planet:gs-4210-24pl4c:2.0:*:*:*:*:*:*:*
cpe:2.3:o:planet:gs-4210-24p2s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:planet:gs-4210-24p2s:3.0:*:*:*:*:*:*:*
cpe:2.3:h:planet:igs-5225-4up1t2s:1.0:*:*:*:*:*:*:*
First Time Planet gs-4210-24pl4c
Planet
Planet igs-5225-4up1t2s
Planet gs-4210-24p2s Firmware
Planet gs-4210-24pl4c Firmware
Planet gs-4210-24p2s
Planet igs-5225-4up1t2s Firmware
References () https://www.twcert.org.tw/en/cp-139-8060-f3955-2.html - () https://www.twcert.org.tw/en/cp-139-8060-f3955-2.html - Third Party Advisory
References () https://www.twcert.org.tw/tw/cp-132-8059-bde5f-1.html - () https://www.twcert.org.tw/tw/cp-132-8059-bde5f-1.html - Third Party Advisory

30 Sep 2024, 12:45

Type Values Removed Values Added
Summary
  • (es) El servicio swctrl se utiliza para detectar y gestionar de forma remota los dispositivos de PLANET Technology. En el caso de determinados modelos de conmutadores, los tokens de autenticación utilizados durante la comunicación con este servicio son contraseñas de usuario codificadas. Debido a que no son lo suficientemente resistentes, los atacantes remotos no autorizados que intercepten los paquetes pueden descifrarlos directamente para obtener contraseñas en texto simple.

30 Sep 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-30 08:15

Updated : 2024-10-04 14:45


NVD link : CVE-2024-8455

Mitre link : CVE-2024-8455

CVE.ORG link : CVE-2024-8455


JSON object : View

Products Affected

planet

  • gs-4210-24p2s_firmware
  • gs-4210-24pl4c
  • gs-4210-24pl4c_firmware
  • igs-5225-4up1t2s
  • igs-5225-4up1t2s_firmware
  • gs-4210-24p2s
CWE
CWE-326

Inadequate Encryption Strength

CWE-261

Weak Encoding for Password