The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2730 | The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/aliasrobotics/RVD/issues/2565 |
|
History
No history.
Status: PUBLISHED
Assigner: Alias
Published:
Updated: 2024-09-16T20:31:47.182Z
Reserved: 2020-03-10T00:00:00.000Z
Link: CVE-2020-10275
No data.
Status : Modified
Published: 2020-06-24T05:15:13.193
Modified: 2024-11-21T04:55:07.113
Link: CVE-2020-10275
No data.
OpenCVE Enrichment
No data.
EUVD