CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
56.3%
There is no account authentication and permission check logic in the firmware and existing apps of SiHAS’s SGW-300, ACM-300, GCM-300, so unauthorized users can remotely control the device.
Vendor | Product | Version | CPE |
---|---|---|---|
shinasys | sihas_sgw-300_firmware | - | cpe:2.3:o:shinasys:sihas_sgw-300_firmware:-:*:*:*:*:android:*:* |
shinasys | sihas_sgw-300_firmware | - | cpe:2.3:o:shinasys:sihas_sgw-300_firmware:-:*:*:*:*:iphone_os:*:* |
shinasys | sihas_sgw-300 | - | cpe:2.3:h:shinasys:sihas_sgw-300:-:*:*:*:*:*:*:* |
shinasys | sihas_acm-300_firmware | - | cpe:2.3:o:shinasys:sihas_acm-300_firmware:-:*:*:*:*:android:*:* |
shinasys | sihas_acm-300_firmware | - | cpe:2.3:o:shinasys:sihas_acm-300_firmware:-:*:*:*:*:iphone_os:*:* |
shinasys | sihas_acm-300 | - | cpe:2.3:h:shinasys:sihas_acm-300:-:*:*:*:*:*:*:* |
shinasys | sihas_gcm-300_firmware | - | cpe:2.3:o:shinasys:sihas_gcm-300_firmware:-:*:*:*:*:android:*:* |
shinasys | sihas_gcm-300_firmware | - | cpe:2.3:o:shinasys:sihas_gcm-300_firmware:-:*:*:*:*:iphone_os:*:* |
shinasys | sihas_gcm-300 | - | cpe:2.3:h:shinasys:sihas_gcm-300:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
56.3%