Kieback & Peter's DDC4000 seriesĀ uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Kieback\&peter
Kieback\&peter ddc4002 Firmware Kieback\&peter ddc4002e Firmware Kieback\&peter ddc4020e Firmware Kieback\&peter ddc4040e Firmware Kieback\&peter ddc4100 Firmware Kieback\&peter ddc4200-l Firmware Kieback\&peter ddc4200 Firmware Kieback\&peter ddc4200e Firmware Kieback\&peter ddc4400 Firmware Kieback\&peter ddc4400e Firmware |
|
CPEs | cpe:2.3:o:kieback\&peter:ddc4002_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4002e_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4020e_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4040e_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4200-l_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4200e_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4400_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kieback\&peter:ddc4400e_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Kieback\&peter
Kieback\&peter ddc4002 Firmware Kieback\&peter ddc4002e Firmware Kieback\&peter ddc4020e Firmware Kieback\&peter ddc4040e Firmware Kieback\&peter ddc4100 Firmware Kieback\&peter ddc4200-l Firmware Kieback\&peter ddc4200 Firmware Kieback\&peter ddc4200e Firmware Kieback\&peter ddc4400 Firmware Kieback\&peter ddc4400e Firmware |
|
Metrics |
ssvc
|
Tue, 22 Oct 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Kieback & Peter's DDC4000 seriesĀ uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system. | |
Title | Kieback&Peter DDC4000 Series Use of Weak Credentials | |
Weaknesses | CWE-1391 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2024-10-22T21:23:17.403Z
Updated: 2024-10-23T14:42:24.238Z
Reserved: 2024-08-21T18:03:31.231Z
Link: CVE-2024-43698
Vulnrichment
Updated: 2024-10-23T14:39:07.008Z
NVD
Status : Awaiting Analysis
Published: 2024-10-22T22:15:04.943
Modified: 2024-10-23T15:12:34.673
Link: CVE-2024-43698
Redhat
No data.