The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.
Advisories

No advisories yet.

Fixes

Solution

The vendor provides a firmware update to version 7.42 (or higher) which can be downloaded via the vendor's customer server portal. It fixes most of the hard-coded credentials that can be directly exploited by an attacker. The vendor did not specify whether future patches will remediate the rest"


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Fri, 13 Dec 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Dec 2024 16:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 12 Dec 2024 14:00:00 +0000

Type Values Removed Values Added
Description The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.
Title Hardcoded credentials
Weaknesses CWE-798
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-11-03T21:54:32.579Z

Reserved: 2024-03-05T09:15:40.202Z

Link: CVE-2024-28146

cve-icon Vulnrichment

Updated: 2025-11-03T21:54:32.579Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-12T14:15:22.613

Modified: 2025-11-03T22:16:50.640

Link: CVE-2024-28146

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.