Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vendor provides a firmware update to version 7.42 (or higher) which can be downloaded via the vendor's customer server portal. It fixes most of the hard-coded credentials that can be directly exploited by an attacker. The vendor did not specify whether future patches will remediate the rest"
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 13 Dec 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device. | |
| Title | Hardcoded credentials | |
| Weaknesses | CWE-798 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T21:54:32.579Z
Reserved: 2024-03-05T09:15:40.202Z
Link: CVE-2024-28146
Updated: 2025-11-03T21:54:32.579Z
Status : Awaiting Analysis
Published: 2024-12-12T14:15:22.613
Modified: 2025-11-03T22:16:50.640
Link: CVE-2024-28146
No data.
OpenCVE Enrichment
No data.