Lucene search

K
cvelistIcscertCVELIST:CVE-2024-34025
HistoryMay 15, 2024 - 7:17 p.m.

CVE-2024-34025 CyberPower PowerPanel business Use of Hard-coded Password

2024-05-1519:17:37
CWE-259
icscert
www.cve.org
1
cve-2024-34025
cyberpower
powerpanel
hard-coded password
authentication bypass
administrator privileges

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

CyberPower PowerPanel business application code contains a hard-coded set of authentication
credentials. This could result in an attacker bypassing authentication
and gaining administrator privileges.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "PowerPanel business",
    "vendor": "CyberPower",
    "versions": [
      {
        "lessThan": "4.9.0",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CVELIST:CVE-2024-34025