There are several hidden accounts. Some of them are intended for maintenance engineers, and with the knowledge of their passwords (e.g., by examining the coredump), these accounts can be used to re-configure the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
History

Mon, 27 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 26 Nov 2024 07:45:00 +0000

Type Values Removed Values Added
Description There are several hidden accounts. Some of them are intended for maintenance engineers, and with the knowledge of their passwords (e.g., by examining the coredump), these accounts can be used to re-configure the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-01-27T17:46:45.224Z

Reserved: 2024-05-22T09:00:11.122Z

Link: CVE-2024-35244

cve-icon Vulnrichment

Updated: 2025-01-27T17:46:37.933Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-26T08:15:06.273

Modified: 2025-01-27T18:15:38.900

Link: CVE-2024-35244

cve-icon Redhat

No data.