漏洞标题
N/A
漏洞描述信息
Hirsch(原Identiv和Viscount)Enterphone MESH 2024及之前版本的Web GUI配置面板使用默认凭据(用户名为freedom,密码为viscount)。在初始配置时,管理员不会被提示更改这些凭据,并且更改凭据需要很多步骤。攻击者可以通过Internet利用这些凭据,通过mesh.webadmin.MESHAdminServlet访问数十个加拿大和美国的公寓楼,并获取居民的个人信息(PII)。需要注意的是,供应商认为“存在漏洞的系统没有遵循制造商的建议,即更改默认密码”。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
漏洞类别
使用硬编码的凭证
漏洞标题
N/A
漏洞描述信息
The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII. NOTE: the Supplier's perspective is that the "vulnerable systems are not following manufacturers' recommendations to change the default password."
CVSS信息
N/A
漏洞类别
N/A