Ubiquiti U7-Pro 7.0.35 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: this is disputed by the Supplier because the observation only established that a password is present in a firmware image; however, the device cannot be deployed without setting a new password during installation.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-798 | |
Metrics |
cvssV3_1
|
Sat, 07 Dec 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ubiquiti U7-Pro 7.0.35 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. | Ubiquiti U7-Pro 7.0.35 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: this is disputed by the Supplier because the observation only established that a password is present in a firmware image; however, the device cannot be deployed without setting a new password during installation. |
Fri, 06 Dec 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ubiquiti U7-Pro 7.0.35 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-12-06T00:00:00
Updated: 2024-12-11T20:26:24.482Z
Reserved: 2024-12-06T00:00:00
Link: CVE-2024-54749
Vulnrichment
Updated: 2024-12-11T20:26:19.662Z
NVD
Status : Awaiting Analysis
Published: 2024-12-06T17:15:12.983
Modified: 2024-12-12T02:08:18.910
Link: CVE-2024-54749
Redhat
No data.