Lucene search

K

Eibport Firmware Security Vulnerabilities

cve
cve

CVE-2020-24573

BAB TECHNOLOGIE GmbH eibPort V3 prior to 3.8.3 devices allow denial of service (Uncontrolled Resource Consumption) via requests to the lighttpd component.

7.5CVSS

7.5AI Score

0.001EPSS

2020-11-12 06:15 PM
21
cve
cve

CVE-2021-28909

BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers to access uncontrolled the login service at /webif/SecurityModule in a brute force attack. The password could be weak and default username is known as 'admin'. This is usable and part of an attack chain to gain SSH ...

9.8CVSS

9.6AI Score

0.002EPSS

2021-09-09 06:15 PM
17
cve
cve

CVE-2021-28910

BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 contains basic SSRF vulnerability. It allow unauthenticated attackers to request to any internal and external server.

7.5CVSS

7.6AI Score

0.002EPSS

2021-09-09 06:15 PM
23
cve
cve

CVE-2021-28911

BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /tmp path which contains some sensitive data (e.g. device serial number). Having those info, a possible loginId can be self-calculated in a brute force attack against BMX interface. This is usable and part...

9.8CVSS

9.4AI Score

0.002EPSS

2021-09-09 06:15 PM
23
cve
cve

CVE-2021-28912

BAB TECHNOLOGIE GmbH eibPort V3. Each device has its own unique hard coded and weak root SSH key passphrase known as 'eibPort string'. This is usable and the final part of an attack chain to gain SSH root access.

7.2CVSS

7.1AI Score

0.001EPSS

2021-09-09 06:15 PM
23
cve
cve

CVE-2021-28913

BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /webif/SecurityModule to validate the so called and hard coded unique 'eibPort String' which acts as the root SSH key passphrase. This is usable and part of an attack chain to gain SSH root access.

9.8CVSS

9.6AI Score

0.002EPSS

2021-09-09 06:15 PM
31
cve
cve

CVE-2021-28914

BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow the user to set a weak password because the strength is shown in configuration tool, but finally not enforced. This is usable and part of an attack chain to gain SSH root access.

6.5CVSS

6.7AI Score

0.002EPSS

2021-09-09 07:15 PM
16