Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-1778
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Default Credential Vulnerability in GajShield Data Security Firewall
Source: NVD (National Vulnerability Database)
Vulnerability Description
This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems. The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
GajShield Data Security Firewall 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GajShield Data Security Firewall是GajShield的一款企业级的防火墙产品,可以提供网络安全解决方案,以保护企业免受各种网络威胁和攻击,包括恶意软件、病毒、间谍软件、网络钓鱼、DDoS攻击等。 GajShield Data Security Firewall 4.28之前版本(4.21版本除外)存在安全漏洞,该漏洞源于允许攻击者在目标系统上以管理权限执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
GajShieldData Security Firewall 4.5 ~ 4.28 -
II. Public POCs for CVE-2023-1778
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-1778
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-1778

No comments yet


Leave a comment