Description
Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions
3.3.23.6.9 and prior, enables an unauthenticated remote attacker to
bypass authentication using hard-coded administrator credentials. These
accounts cannot be disabled.
Published: 2024-08-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Vonets has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com for additional information.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-38955 Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to bypass authentication using hard-coded administrator credentials. These accounts cannot be disabled.
History

Tue, 20 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Vonets vap11ac
Vonets vap11g
Vonets vap11g-300
Vonets vap11g-500
Vonets vap11g-500 Firmware
Vonets vap11g-500s
Vonets vap11n-300
Vonets vap11s
Vonets vap11s-5g
Vonets var11n-300
Vonets var1200-h
Vonets var1200-l
Vonets var600-h
Vonets vbg1200
Vonets vga-1000
CPEs cpe:2.3:h:vonets:vap11ac:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vap11g-300:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vap11g-500:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vap11g-500s:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vap11g:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vap11n-300:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vap11s-5g:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vap11s:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:var11n-300:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:var1200-h:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:var1200-l:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:var600-h:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vbg1200:-:*:*:*:*:*:*:*
cpe:2.3:h:vonets:vga-1000:-:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vap11g-500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*
Vendors & Products Vonets vap11ac
Vonets vap11g
Vonets vap11g-300
Vonets vap11g-500
Vonets vap11g-500 Firmware
Vonets vap11g-500s
Vonets vap11n-300
Vonets vap11s
Vonets vap11s-5g
Vonets var11n-300
Vonets var1200-h
Vonets var1200-l
Vonets var600-h
Vonets vbg1200
Vonets vga-1000

Fri, 09 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Vonets
Vonets vap11ac Firmware
Vonets vap11g-300 Firmware
Vonets vap11g-500s Firmware
Vonets vap11g Firmware
Vonets vap11n-300 Firmware
Vonets vap11s-5g Firmware
Vonets vap11s Firmware
Vonets var11n-300 Firmware
Vonets var1200-h Firmware
Vonets var1200-l Firmware
Vonets var600-h Firmware
Vonets vbg1200 Firmware
Vonets vga-1000 Firmware
CPEs cpe:2.3:a:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:vap11g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:vap11s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:var600-h_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*
Vendors & Products Vonets
Vonets vap11ac Firmware
Vonets vap11g-300 Firmware
Vonets vap11g-500s Firmware
Vonets vap11g Firmware
Vonets vap11n-300 Firmware
Vonets vap11s-5g Firmware
Vonets vap11s Firmware
Vonets var11n-300 Firmware
Vonets var1200-h Firmware
Vonets var1200-l Firmware
Vonets var600-h Firmware
Vonets vbg1200 Firmware
Vonets vga-1000 Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Aug 2024 20:00:00 +0000

Type Values Removed Values Added
Description Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and WiFi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to bypass authentication using hard-coded administrator credentials. These accounts cannot be disabled. Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to bypass authentication using hard-coded administrator credentials. These accounts cannot be disabled.

Thu, 08 Aug 2024 18:00:00 +0000

Type Values Removed Values Added
Description Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and WiFi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to bypass authentication using hard-coded administrator credentials. These accounts cannot be disabled.
Title Vonets WiFi Bridges Use of Hard-coded Credentials
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Vonets Vap11ac Vap11ac Firmware Vap11g Vap11g-300 Vap11g-300 Firmware Vap11g-500 Vap11g-500 Firmware Vap11g-500s Vap11g-500s Firmware Vap11g Firmware Vap11n-300 Vap11n-300 Firmware Vap11s Vap11s-5g Vap11s-5g Firmware Vap11s Firmware Var11n-300 Var11n-300 Firmware Var1200-h Var1200-h Firmware Var1200-l Var1200-l Firmware Var600-h Var600-h Firmware Vbg1200 Vbg1200 Firmware Vga-1000 Vga-1000 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-09T14:37:54.073Z

Reserved: 2024-07-30T16:15:10.064Z

Link: CVE-2024-41161

cve-icon Vulnrichment

Updated: 2024-08-09T14:37:35.348Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-08T18:15:10.640

Modified: 2024-08-20T17:09:50.647

Link: CVE-2024-41161

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses