Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Panasonic Arbitrator Back-End Server (BES) MK 2.0 VPU before 9.3.1 build 4.08.003.0, when USB Wi-Fi or Direct LAN is enabled, and MK 3.0 VPU before 9.3.1 build 5.06.000.0, when Embedded Wi-Fi or Direct LAN is enabled, does not use encryption, which allows remote attackers to obtain sensitive information by sniffing the network for client-server traffic, as demonstrated by Active Directory credential information.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Panasonic Arbitrator Back-End Server 远程信息泄露漏洞
Vulnerability Description
Panasonic Arbitrator是日本松下电器(Panasonic)公司的一套高清车载数字视频记录系统。Back-End Server(BES)是一个后端服务器。 Panasonic Arbitrator的BES中存在安全漏洞,该漏洞源于程序没有使用加密算法。远程攻击者可通过嗅探网络中的client-server流量利用该漏洞获取敏感信息。以下产品受到影响:使用USB Wi-Fi或Direct LAN的BES MK 2.0 VPU 9.3.1 build 4.08.003.0之前版本,使用Embe
CVSS Information
N/A
Vulnerability Type
N/A