Security Vulnerabilities Related To CWE-259
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2021-36312 |
259 |
|
+Priv |
2021-11-23 |
2021-11-24 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Dell EMC CloudLink 7.1 and all prior versions contain a Hard-coded Password Vulnerability. A remote high privileged attacker, with the knowledge of the hard-coded credentials, may potentially exploit this vulnerability to gain unauthorized access to the system. |
2 |
CVE-2021-32525 |
259 |
|
Exec Code |
2021-07-07 |
2021-09-20 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. |
3 |
CVE-2021-22729 |
259 |
|
+Priv |
2021-07-21 |
2021-07-28 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
A CWE-259: Use of Hard-coded Password vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could allow an attacker to gain unauthorized administrative privileges when accessing to the charging station web server. |
Total number of vulnerabilities :
3
Page :
1
(This Page)