ANCHOR from Global Wisdom Software is an integrated product running on a Windows virtual machine. The underlying Windows OS of the product contains high-privilege service accounts. If these accounts use default passwords, attackers could remotely log in to the virtual machine using the default credentials.
Fixes

Solution

Modify the default password manually or apply the following updates to automatically change the default password: For the 2.5 series, please update to version 2.5.9.5 or later. For the 2.7 series, please update to version 2.7.2.4 or later. For remote access, versions 2.5.3.1 and later and versions 2.7 series have disabled the SMB service by default and restricted high-privilege service accounts from remote login via RDP and WinRM services. If you need to use the following services, it is recommended to set up a firewall to restrict IP sources: 135 (RPC), 139 (NetBIOS), 445 (SMB), 3389 (RDP), 5985 (WinRM).


Workaround

No workaround given by the vendor.

History

Tue, 24 Dec 2024 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Dec 2024 10:30:00 +0000

Type Values Removed Values Added
Description ANCHOR from Global Wisdom Software is an integrated product running on a Windows virtual machine. The underlying Windows OS of the product contains high-privilege service accounts. If these accounts use default passwords, attackers could remotely log in to the virtual machine using the default credentials.
Title Global Wisdom Software ANCHOR - Undocumented Privileged Account
Weaknesses CWE-1392
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-12-24T02:01:08.577Z

Reserved: 2024-12-23T02:27:53.261Z

Link: CVE-2024-12902

cve-icon Vulnrichment

Updated: 2024-12-24T02:01:03.233Z

cve-icon NVD

Status : Received

Published: 2024-12-23T11:15:06.153

Modified: 2024-12-23T11:15:06.153

Link: CVE-2024-12902

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.