Description
An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.
Published: 2021-06-04
Score: 9.8 Critical
EPSS: 9.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-18163 An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.
History

No history.

Subscriptions

Chiyu-tech Bf-430 Bf-430 Firmware Bf-431 Bf-431 Firmware Bf-450m Bf-450m Firmware Semac D1 Semac D1 Firmware Semac D2 Semac D2 Firmware Semac D2 N300 Semac D2 N300 Firmware Semac D4 Semac D4 Firmware Semac S1 Osdp Semac S1 Osdp Firmware Semac S2 Semac S2 Firmware Semac S3v3 Semac S3v3 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T22:55:53.355Z

Reserved: 2021-04-15T00:00:00.000Z

Link: CVE-2021-31251

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-04T21:15:07.517

Modified: 2024-11-21T06:05:22.107

Link: CVE-2021-31251

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses