Vulnerabilities (CVE)

Filtered by CWE-255
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-7921 1 Schneider-electric 4 Proface Gp-pro Ex Ex-ed, Proface Gp-pro Ex Pfxexedls, Proface Gp-pro Ex Pfxexedv and 1 more 2022-01-31 6.4 MEDIUM 9.1 CRITICAL
The FTP server in Pro-face GP-Pro EX EX-ED before 4.05.000, PFXEXEDV before 4.05.000, PFXEXEDLS before 4.05.000, and PFXEXGRPLS before 4.05.000 has hardcoded credentials, which makes it easier for remote attackers to bypass authentication by leveraging knowledge of these credentials.
CVE-2016-0898 1 Vmware 1 Pivotal Software Mysql 2021-09-09 5.0 MEDIUM 10.0 CRITICAL
MySQL for PCF tiles 1.7.x before 1.7.10 were discovered to log the AWS access key in plaintext. These credentials were logged to the Service Backup component logs, and not the system log, thus were not exposed outside the Service Backup VM.
CVE-2015-6472 1 Wago 6 750-849, 750-849 Firmware, 750-881 and 3 more 2021-07-09 5.0 MEDIUM 9.8 CRITICAL
WAGO IO 750-849 01.01.27 and 01.02.05, WAGO IO 750-881, and WAGO IO 758-870 have weak credential management.
CVE-2019-13560 1 Dlink 2 Dir-655, Dir-655 Firmware 2021-04-23 5.0 MEDIUM 9.8 CRITICAL
D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to force a blank password via the apply_sec.cgi setup_wizard parameter.
CVE-2013-1430 2 Debian, Neutrinolabs 2 Debian Linux, Xrdp 2020-07-08 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.
CVE-2017-6047 1 3m 1 Detcon Sitewatch Gateway 2019-10-09 5.0 MEDIUM 9.8 CRITICAL
Detcon Sitewatch Gateway, all versions without cellular, Passwords are presented in plaintext in a file that is accessible without authentication.
CVE-2016-6552 1 Greenpacket 2 Dx-350, Dx-350 Firmware 2019-10-09 10.0 HIGH 9.8 CRITICAL
Green Packet DX-350 uses non-random default credentials of: root:wimax. A remote network attacker can gain privileged access to a vulnerable device.
CVE-2016-6551 1 Intelliantech 26 T100q, T100q Firmware, T100w and 23 more 2019-10-09 10.0 HIGH 9.8 CRITICAL
Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device.
CVE-2016-6553 1 Nuuo 2 Nt-4040 Titan, Nt-4040 Titan Firmware 2019-10-09 10.0 HIGH 9.8 CRITICAL
Nuuo NT-4040 Titan, firmware NT-4040_01.07.0000.0015_1120, uses non-random default credentials of: admin:admin and localdisplay:111111. A remote network attacker can gain privileged access to a vulnerable device.
CVE-2016-6554 1 Synology 6 Ds107, Ds107 Firmware, Ds116 and 3 more 2019-10-09 10.0 HIGH 9.8 CRITICAL
Synology NAS servers DS107, firmware version 3.1-1639 and prior, and DS116, DS213, firmware versions prior to 5.2-5644-1, use non-random default credentials of: guest:(blank) and admin:(blank) . A remote network attacker can gain privileged access to a vulnerable device.
CVE-2016-7043 1 Redhat 1 Kie-server 2019-10-09 5.0 MEDIUM 9.8 CRITICAL
It has been reported that KIE server and Busitess Central before version 7.21.0.Final contain username and password as plaintext Java properties. Any app deployed on the same server would have access to these properties, thus granting access to ther services.
CVE-2016-1265 1 Juniper 1 Junos Space 2019-10-09 7.5 HIGH 9.8 CRITICAL
A remote unauthenticated network based attacker with access to Junos Space may execute arbitrary code on Junos Space or gain access to devices managed by Junos Space using cross site request forgery (CSRF), default authentication credentials, information leak and command injection attack vectors. All versions of Juniper Networks Junos Space prior to 15.1R3 are affected.
CVE-2015-1320 1 Canonical 1 Metal As A Service 2019-10-09 5.0 MEDIUM 9.8 CRITICAL
The SeaMicro provisioning of Ubuntu MAAS logs credentials, including username and password, for the management interface. This issue affects Ubuntu MAAS versions prior to 1.9.2.
CVE-2014-5433 1 Baxter 3 Sigma Spectrum Infusion System, Sigma Spectrum Infusion System Firmware, Wireless Battery Module 2019-10-09 7.5 HIGH 9.8 CRITICAL
An unauthenticated remote attacker may be able to execute commands to view wireless account credentials that are stored in cleartext on Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16, which may allow an attacker to gain access the host network. Baxter has released a new version of the SIGMA Spectrum Infusion System, Version 8, which incorporates hardware and software changes.
CVE-2017-6900 1 Riello-ups 2 Netman 204, Netman 204 Firmware 2019-07-15 10.0 HIGH 9.8 CRITICAL
An issue was discovered in Riello NetMan 204 14-2 and 15-2. The issue is with the login script and wrongpass Python script used for authentication. When calling wrongpass, the variables $VAL0 and $VAL1 should be enclosed in quotes to prevent the potential for Bash command injection. Further to this, VAL0 and VAL1 should be sanitised to ensure they do not contain malicious characters. Passing it the username of '-' will cause it to time out and log the user in because of poor error handling. This will log the attacker in as an administrator where the telnet / ssh services can be enabled, and the credentials for local users can be reset. Also, login.cgi accepts the username as a GET parameter, so login can be achieved by browsing to the /cgi-bin/login.cgi?username=-%20a URI.
CVE-2017-8229 1 Amcrest 2 Ipm-721s, Ipm-721s Firmware 2019-07-11 5.0 MEDIUM 9.8 CRITICAL
Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function sub_436D6 in IDA pro is identified to be setting up the configuration for the device. If one scrolls to the address 0x000437C2 then one can see that /current_config is being set as an ALIAS for /mnt/mtd/Config folder on the device. If one TELNETs into the device and navigates to /mnt/mtd/Config folder, one can observe that it contains various files such as Account1, Account2, SHAACcount1, etc. This means that if one navigates to http://[IPofcamera]/current_config/Sha1Account1 then one should be able to view the content of the files. The security researchers assumed that this was only possible only after authentication to the device. However, when unauthenticated access tests were performed for the same URL as provided above, it was observed that the device file could be downloaded without any authentication.
CVE-2017-9385 1 Getvera 4 Veraedge, Veraedge Firmware, Veralite and 1 more 2019-06-20 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered on Vera Veralite 1.7.481 devices. The device has an additional OpenWRT interface in addition to the standard web interface which allows the highest privileges a user can obtain on the device. This web interface uses root as the username and the password in the /etc/cmh/cmh.conf file which can be extracted by an attacker using a directory traversal attack, and then log in to the device with the highest privileges.
CVE-2019-7690 1 Mobatek 1 Mobaxterm 2019-05-15 5.0 MEDIUM 9.8 CRITICAL
In MobaTek MobaXterm Personal Edition v11.1 Build 3860, the SSH private key and its password can be retrieved from process memory for the lifetime of the process, even after the user disconnects from the remote SSH server. This affects Passwordless Authentication that has a Password Protected SSH Private Key.
CVE-2017-17836 1 Apache 1 Airflow 2019-04-19 5.0 MEDIUM 9.8 CRITICAL
In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, whether it be via XSS or by leaving a machine unlocked can exfiltrate all credentials from the system.
CVE-2015-9278 1 Mailenable 1 Mailenable 2019-02-01 5.0 MEDIUM 9.8 CRITICAL
MailEnable before 8.60 allows Privilege Escalation because admin accounts could be created as a consequence of %0A mishandling in AUTH.TAB after a password-change request.
CVE-2015-8362 1 Harman 1 Amx Firmware 2018-10-09 10.0 HIGH 9.8 CRITICAL
The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices before 2015-10-12 has a hardcoded password for the BlackWidow account, which makes it easier for remote attackers to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-2016-1984.
CVE-2015-3252 1 Apache 1 Cloudstack 2018-10-09 6.0 MEDIUM 9.8 CRITICAL
Apache CloudStack before 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual machines, which allows remote attackers to gain access by connecting to the VNC server.
CVE-2014-4861 1 Thycotic 1 Secret Server 2018-03-29 7.5 HIGH 9.8 CRITICAL
The Remote Desktop Launcher in Thycotic Secret Server before 8.6.000010 does not properly cleanup a temporary file that contains an encrypted password once a session has ended.
CVE-2016-6599 1 Bmc 1 Track-it\! 2018-02-26 7.5 HIGH 9.8 CRITICAL
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.
CVE-2016-0872 1 Kabona 1 Webdatorcentral 2017-11-29 5.0 MEDIUM 9.8 CRITICAL
A Plaintext Storage of a Password issue was discovered in Kabona AB WebDatorCentral (WDC) versions prior to Version 3.4.0. WDC stores password credentials in plaintext.
CVE-2016-10512 1 Multitech 1 Faxfinder 2017-10-11 10.0 HIGH 9.8 CRITICAL
MultiTech FaxFinder before 4.1.2 stores Passwords unencrypted for maintaining the test connectivity function of its LDAP configuration. These credentials are retrieved by the system when the LDAP configuration page is opened and are embedded directly into the HTML source code in cleartext.
CVE-2015-8009 1 Mediawiki 1 Mediawiki 2017-09-15 5.0 MEDIUM 9.8 CRITICAL
The MWOAuthDataStore::lookup_token function in Extension:OAuth for MediaWiki 1.25.x before 1.25.3, 1.24.x before 1.24.4, and before 1.23.11 does not properly validate the signature when checking the authorization signature, which allows remote registered Consumers to use another Consumer's credentials by leveraging knowledge of the credentials.
CVE-2015-7251 1 Zte 2 Zxhn H108n R1a, Zxhn H108n R1a Firmware 2017-09-13 10.0 HIGH 9.8 CRITICAL
ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE have a hardcoded password of root for the root account, which allows remote attackers to obtain administrative access via a TELNET session.
CVE-2016-5411 1 Redhat 2 Enterprise Linux, Quickstart Cloud Installer 2017-07-05 10.0 HIGH 9.8 CRITICAL
/var/lib/ovirt-engine/setup/engine-DC-config.py in Red Hat QuickStart Cloud Installer (QCI) before 1.0 GA is created world readable and contains the root password of the deployed system.
CVE-2016-6093 1 Ibm 2 Security Key Lifecycle Manager, Tivoli Key Lifecycle Manager 2017-06-13 5.0 MEDIUM 9.8 CRITICAL
IBM Tivoli Key Lifecycle Manager does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.
CVE-2015-8282 1 Seawell Networks 1 Spectrum Sdc 2017-04-19 7.5 HIGH 9.8 CRITICAL
SeaWell Networks Spectrum SDC 02.05.00 has a default password of "admin" for the "admin" account.
CVE-2016-5070 1 Sierrawireless 2 Aleos Firmware, Gx 440 2017-04-14 5.0 MEDIUM 9.8 CRITICAL
Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 store passwords in cleartext.
CVE-2016-5066 1 Sierrawireless 2 Aleos Firmware, Gx 440 2017-04-14 10.0 HIGH 9.8 CRITICAL
Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 have weak passwords for admin, rauser, sconsole, and user.
CVE-2015-8626 1 Mediawiki 1 Mediawiki 2017-03-27 5.0 MEDIUM 9.8 CRITICAL
The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack.
CVE-2016-8378 1 Lynxspring 1 Jenesys Bas Bridge 2017-02-17 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered in Lynxspring JENEsys BAS Bridge versions 1.1.8 and older. The application's database lacks sufficient safeguards for protecting credentials.
CVE-2016-9081 1 Joomla 1 Joomla\! 2017-01-26 7.5 HIGH 9.8 CRITICAL
Joomla! 3.4.4 through 3.6.3 allows attackers to reset username, password, and user group assignments and possibly perform other user account modifications via unspecified vectors.
CVE-2016-7456 1 Vmware 1 Vsphere Data Protection 2017-01-03 10.0 HIGH 9.8 CRITICAL
VMware vSphere Data Protection (VDP) 5.5.x though 6.1.x has an SSH private key with a publicly known password, which makes it easier for remote attackers to obtain login access via an SSH session.
CVE-2015-6016 1 Zyxel 4 Nbg-418n, P-660hw-t1 2, Pmg5318-b20a Firmware and 1 more 2016-12-07 10.0 HIGH 9.8 CRITICAL
ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors.
CVE-2016-1984 1 Harman 1 Amx Firmware 2016-12-06 10.0 HIGH 9.8 CRITICAL
The setUpSubtleUserAccount function in /bin/bw on Harman AMX devices before 2016-01-20 has a hardcoded password for the 1MB@tMaN account, which makes it easier for remote attackers to obtain access via a (1) SSH or (2) HTTP session, a different vulnerability than CVE-2015-8362.
CVE-2016-1341 1 Cisco 1 Nx-os 2016-12-06 6.9 MEDIUM 9.8 CRITICAL
Cisco NX-OS 7.0(1)N1(1), 7.0(1)N1(3), and 7.0(4)N1(1) on Nexus 2000 Fabric Extender devices has a blank root password, which allows local users to gain privileges via unspecified vectors, aka Bug ID CSCur22079.
CVE-2015-7915 1 Sauter 1 Moduweb Vision 2016-12-03 10.0 HIGH 9.8 CRITICAL
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 sends cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network.
CVE-2016-1601 1 Suse 4 Linux Enterprise Desktop, Linux Enterprise Server, Linux Enterprise Software Development Kit and 1 more 2016-12-01 10.0 HIGH 9.8 CRITICAL
yast2-users before 3.1.47, as used in SUSE Linux Enterprise 12 SP1, does not properly set empty password fields in /etc/shadow during an AutoYaST installation when the profile does not contain inst-sys users, which might allow attackers to have unspecified impact via unknown vectors.
CVE-2016-6531 1 Opendental 1 Opendental 2016-11-28 7.5 HIGH 9.8 CRITICAL
** DISPUTED ** Open Dental 16.1 and earlier has a hardcoded MySQL root password, which allows remote attackers to obtain administrative access by leveraging access to intranet TCP port 3306. NOTE: the vendor disputes this issue, stating that the "vulnerability note ... is factually false ... there is indeed a default blank password, but it can be changed ... We recommend that users change it, each customer receives direction."
CVE-2015-7280 1 Readynet Solutions 2 Wrt300n-dd, Wrt300n-dd Firmware 2016-11-28 10.0 HIGH 9.8 CRITICAL
The web administration interface on ReadyNet WRT300N-DD devices with firmware 1.0.26 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
CVE-2015-7277 1 Ampedwireless 2 R10000, R10000 Firmware 2016-11-28 9.3 HIGH 9.8 CRITICAL
The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
CVE-2016-5670 1 Crestron 2 Dm-txrx-100-str, Dm-txrx-100-str Firmware 2016-08-15 10.0 HIGH 9.8 CRITICAL
Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 have a hardcoded password of admin for the admin account, which makes it easier for remote attackers to obtain access via the web management interface.
CVE-2016-2331 1 Systech 2 Syslink Sl-1000 Modular Gateway, Syslink Sl-1000 Modular Gateway Firmware 2016-05-31 10.0 HIGH 9.8 CRITICAL
The web interface on SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors.
CVE-2016-4325 1 Lantronix 1 Xprintserver Firmware 2016-05-19 10.0 HIGH 9.8 CRITICAL
Lantronix xPrintServer devices with firmware before 5.0.1-65 have hardcoded credentials, which allows remote attackers to obtain root access via unspecified vectors.
CVE-2015-7261 1 Qnap 2 Iartist Lite, Signage Station 2016-03-11 7.5 HIGH 9.8 CRITICAL
The FTP service in QNAP iArtist Lite before 1.4.54, as distributed with QNAP Signage Station before 2.0.1, has hardcoded credentials, which makes it easier for remote attackers to obtain access via a session on TCP port 21.
CVE-2016-2230 1 Openelec 1 Openelec 2016-02-25 10.0 HIGH 9.8 CRITICAL
OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote attackers to obtain access via an SSH session.