A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products).
Project Subscriptions
| Vendors | Products |
|---|---|
|
Kalkitech
Subscribe
|
Sync2000-m1
Subscribe
Sync2000-m1 Firmware
Subscribe
Sync2000-m2
Subscribe
Sync2000-m2 Firmware
Subscribe
Sync2000-m4
Subscribe
Sync2000-m4 Firmware
Subscribe
Sync2101-m1
Subscribe
Sync2101-m1 Firmware
Subscribe
Sync2101-m2
Subscribe
Sync2101-m2 Firmware
Subscribe
Sync2101-m6
Subscribe
Sync2101-m6 Firmware
Subscribe
Sync2101-m7
Subscribe
Sync2101-m7 Firmware
Subscribe
Sync2101-m8
Subscribe
Sync2101-m8 Firmware
Subscribe
Sync2111-m2
Subscribe
Sync2111-m2 Firmware
Subscribe
Sync2111-m3
Subscribe
Sync2111-m3 Firmware
Subscribe
Sync221-m1
Subscribe
Sync221-m1 Firmware
Subscribe
Sync241-m1
Subscribe
Sync241-m1 Firmware
Subscribe
Sync241-m2
Subscribe
Sync241-m2 Firmware
Subscribe
Sync241-m4
Subscribe
Sync241-m4 Firmware
Subscribe
Sync261-m1
Subscribe
Sync261-m1 Firmware
Subscribe
Sync3000-m1
Subscribe
Sync3000-m12
Subscribe
Sync3000-m12 Firmware
Subscribe
Sync3000-m1 Firmware
Subscribe
Sync3000-m2
Subscribe
Sync3000-m2 Firmware
Subscribe
Sync3000-m3
Subscribe
Sync3000-m3 Firmware
Subscribe
Sync3000-m4
Subscribe
Sync3000-m4 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31391 | A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products). |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:25:16.841Z
Reserved: 2021-12-06T00:00:00
Link: CVE-2021-44564
No data.
Status : Modified
Published: 2022-01-06T12:15:08.190
Modified: 2024-11-21T06:31:13.317
Link: CVE-2021-44564
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD