Description
A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.
Published: 2022-01-24
Score: 9.8 Critical
EPSS: 6.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-9336 A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.
History

No history.

Subscriptions

Telosalliance Z\/ip One Z\/ip One Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T13:53:16.989Z

Reserved: 2020-08-07T00:00:00.000Z

Link: CVE-2020-17383

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-24T20:15:07.923

Modified: 2024-11-21T05:07:58.910

Link: CVE-2020-17383

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses