Vulnerabilities (CVE)

Filtered by CWE-798
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-50948 1 Ibm 1 Storage Fusion Hci 2024-01-11 N/A 9.8 CRITICAL
IBM Storage Fusion HCI 2.1.0 through 2.6.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 275671.
CVE-2023-43870 1 Paxton-access 1 Net2 2023-12-28 N/A 9.8 CRITICAL
When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.
CVE-2023-48388 1 Multisuns 2 Easylog Web\+, Easylog Web\+ Firmware 2023-12-22 N/A 9.8 CRITICAL
Multisuns EasyLog web+ has a vulnerability of using hard-coded credentials. An remote attacker can exploit this vulnerability to access the system to perform arbitrary system operations or disrupt service.
CVE-2023-48392 1 Kaifa 1 Webitr Attendance System 2023-12-22 N/A 9.8 CRITICAL
Kaifa Technology WebITR is an online attendance system, it has a vulnerability in using hard-coded encryption key. An unauthenticated remote attacker can generate valid token parameter and exploit this vulnerability to access system with arbitrary user account, including administrator’s account, to execute login account’s permissions, and obtain relevant information.
CVE-2023-45499 1 Vinchin 1 Vinchin Backup And Recovery 2023-12-21 N/A 9.8 CRITICAL
VinChin Backup & Recovery v5.0.*, v6.0.*, v6.7.*, and v7.0.* was discovered to contain hardcoded credentials.
CVE-2023-6448 1 Unitronics 26 Vision1040, Vision1040 Firmware, Vision120 and 23 more 2023-12-19 N/A 9.8 CRITICAL
Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
CVE-2023-39169 1 Enbw 2 Senec Storage Box, Senec Storage Box Firmware 2023-12-14 N/A 9.8 CRITICAL
The affected devices use publicly available default credentials with administrative privileges.
CVE-2023-40300 1 Netscout 1 Ngeniuspulse 2023-12-12 N/A 9.8 CRITICAL
NETSCOUT nGeniusPULSE 3.8 has a Hardcoded Cryptographic Key.
CVE-2023-47213 1 C-first 56 Cfr-1004ea, Cfr-1004ea Firmware, Cfr-1008ea and 53 more 2023-12-05 N/A 9.8 CRITICAL
First Corporation's DVRs use a hard-coded password, which may allow a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround.
CVE-2023-23324 1 Zumtobel 2 Netlink Ccd, Netlink Ccd Firmware 2023-12-05 N/A 9.8 CRITICAL
Zumtobel Netlink CCD Onboard 3.74 - Firmware 3.80 was discovered to contain hardcoded credentials for the Administrator account.
CVE-2023-30801 1 Qbittorrent 1 Qbittorrent 2023-11-30 N/A 9.8 CRITICAL
All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.
CVE-2023-47800 1 Natus 2 Neuroworks Eeg, Sleepworks 2023-11-23 N/A 9.8 CRITICAL
Natus NeuroWorks and SleepWorks before 8.4 GMA3 utilize a default password of xltek for the Microsoft SQL Server service sa account, allowing a threat actor to perform remote code execution, data exfiltration, or other nefarious actions such as tampering with data or destroying/disrupting MSSQL services.
CVE-2023-41137 1 Appsanywhere 1 Appsanywhere Client 2023-11-18 N/A 9.8 CRITICAL
Symmetric encryption used to protect messages between the AppsAnywhere server and client can be broken by reverse engineering the client and used to impersonate the AppsAnywhere server.
CVE-2023-5777 1 Weintek 1 Easybuilder Pro 2023-11-14 N/A 9.8 CRITICAL
Weintek EasyBuilder Pro contains a vulnerability that, even when the private key is immediately deleted after the crash report transmission is finished, the private key is exposed to the public, which could result in obtaining remote control of the crash report server.
CVE-2023-31579 1 Tangyh 1 Lamp-cloud 2023-11-09 N/A 9.8 CRITICAL
Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token.
CVE-2023-38024 1 Myspotcam 2 Fhd 2, Fhd 2 Firmware 2023-08-29 N/A 9.8 CRITICAL
SpotCam Co., Ltd. SpotCam FHD 2’s hidden Telnet function has a vulnerability of using hard-coded Telnet credentials. An remote unauthenticated attacker can exploit this vulnerability to access the system to perform arbitrary system operations or disrupt service.
CVE-2023-38026 1 Myspotcam 2 Fhd 2, Fhd 2 Firmware 2023-08-29 N/A 9.8 CRITICAL
SpotCam Co., Ltd. SpotCam FHD 2 has a vulnerability of using hard-coded uBoot credentials. An remote attacker can exploit this vulnerability to access the system to perform arbitrary system operations or disrupt service.
CVE-2023-39808 1 Nvki 1 Intelligent Broadband Subscriber Gateway 2023-08-24 N/A 9.8 CRITICAL
N.V.K.INTER CO., LTD. (NVK) iBSG v3.5 was discovered to contain a hardcoded root password which allows attackers to login with root privileges via the SSH service.
CVE-2023-4204 1 Moxa 2 Nport Iaw5000a-i\/o, Nport Iaw5000a-i\/o Firmware 2023-08-24 N/A 9.8 CRITICAL
NPort IAW5000A-I/O Series firmware version v2.2 and prior is affected by a hardcoded credential vulnerabilitywhich poses a potential risk to the security and integrity of the affected device. This vulnerability is attributed to the presence of a hardcoded key, which could potentially facilitate firmware manipulation.
CVE-2023-3264 2 Cyberpower, Dataprobe 45 Powerpanel Server, Iboot-pdu4-c20, Iboot-pdu4-c20 Firmware and 42 more 2023-08-22 N/A 9.8 CRITICAL
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.
CVE-2023-33372 1 Connectedio 1 Connected Io 2023-08-08 N/A 9.8 CRITICAL
Connected IO v2.1.0 and prior uses a hard-coded username/password pair embedded in their device's firmware used for device communication using MQTT. An attacker who gained access to these credentials is able to connect to the MQTT broker and send messages on behalf of devices, impersonating them. in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.
CVE-2021-40903 1 Antminer Monitor Project 1 Antminer Monitor 2023-08-08 7.5 HIGH 9.8 CRITICAL
A vulnerability in Antminer Monitor 0.50.0 exists because of backdoor or misconfiguration inside a settings file in flask server. Settings file has a predefined secret string, which would be randomly generated, however it is static.
CVE-2022-34907 1 Filewave 1 Filewave 2023-08-08 N/A 9.8 CRITICAL
An authentication bypass vulnerability exists in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to gain access to the system with the highest authority possible and gain full control over the FileWave platform.
CVE-2022-35857 1 Kvf-admin Project 1 Kvf-admin 2023-08-08 N/A 9.8 CRITICAL
kvf-admin through 2022-02-12 allows remote attackers to execute arbitrary code because deserialization is mishandled. The rememberMe parameter is encrypted with a hardcoded key from the com.kalvin.kvf.common.shiro.ShiroConfig file.
CVE-2023-33371 1 Assaabloy 1 Control Id Idsecure 2023-08-05 N/A 9.8 CRITICAL
Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.
CVE-2023-37215 1 Jbl 2 Jbl Bar 5.1 Surround, Jbl Bar 5.1 Surround Firmware 2023-08-04 N/A 9.8 CRITICAL
JBL soundbar multibeam 5.1 - CWE-798: Use of Hard-coded Credentials
CVE-2023-32227 1 Synel 2 Synergy\/a, Synergy\/a Firmware 2023-08-03 N/A 9.8 CRITICAL
Synel SYnergy Fingerprint Terminals - CWE-798: Use of Hard-coded Credentials
CVE-2023-37291 1 Gss 1 Vitals Enterprise Social Platform 2023-07-31 N/A 9.8 CRITICAL
Galaxy Software Services Vitals ESP is vulnerable to using a hard-coded encryption key. An unauthenticated remote attacker can generate a valid token parameter and exploit this vulnerability to access system to operate processes and access data. This issue affects Vitals ESP: from 3.0.8 through 6.2.0.
CVE-2021-21820 1 Dlink 2 Dir-3040, Dir-3040 Firmware 2022-07-29 7.5 HIGH 9.8 CRITICAL
A hard-coded password vulnerability exists in the Libcli Test Environment functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to code execution. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2022-24657 1 Goldshell 1 Goldshell Miner Firmware 2022-07-27 N/A 9.8 CRITICAL
Goldshell ASIC Miners v2.1.x was discovered to contain hardcoded credentials which allow attackers to remotely connect via the SSH protocol (port 22).
CVE-2022-2107 1 Micodus 2 Mv720, Mv720 Firmware 2022-07-27 N/A 9.8 CRITICAL
The MiCODUS MV720 GPS tracker API server has an authentication mechanism that allows devices to use a hard-coded master password. This may allow an attacker to send SMS commands directly to the GPS tracker as if they were coming from the GPS owner’s mobile number.
CVE-2022-34045 1 Wavlink 2 Wl-wn530hg4, Wl-wn530hg4 Firmware 2022-07-27 N/A 9.8 CRITICAL
Wavlink WN530HG4 M30HG4.V5030.191116 was discovered to contain a hardcoded encryption/decryption key for its configuration files at /etc_ro/lighttpd/www/cgi-bin/ExportAllSettings.sh.
CVE-2022-32985 1 Nexans 26 Gigaswitch 641 Desk V5 Sfp-vi, Gigaswitch 641 Desk V5 Sfp-vi Firmware, Gigaswitch 642 Desk V5 Sfp-2vi and 23 more 2022-07-25 N/A 9.8 CRITICAL
libnx_apl.so on Nexans FTTO GigaSwitch before 6.02N and 7.x before 7.02 implements a Backdoor Account for SSH logins on port 50200 or 50201.
CVE-2022-31210 1 Infiray 2 Iray-a8z3, Iray-a8z3 Firmware 2022-07-25 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Infiray IRAY-A8Z3 1.0.957. The binary file /usr/local/sbin/webproject/set_param.cgi contains hardcoded credentials to the web application. Because these accounts cannot be deactivated or have their passwords changed, they are considered to be backdoor accounts.
CVE-2021-21913 1 Dlink 2 Dir-3040, Dir-3040 Firmware 2022-07-21 7.5 HIGH 9.8 CRITICAL
An information disclosure vulnerability exists in the WiFi Smart Mesh functionality of D-LINK DIR-3040 1.13B03. A specially-crafted network request can lead to command execution. An attacker can connect to the MQTT service to trigger this vulnerability.
CVE-2020-4150 1 Ibm 1 Security Siteprotector System 2022-07-18 7.5 HIGH 9.8 CRITICAL
IBM SiteProtector Appliance 3.1.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 174142.
CVE-2021-43136 1 Formalms 1 Formalms 2022-07-12 6.8 MEDIUM 9.8 CRITICAL
An authentication bypass issue in FormaLMS <= 2.4.4 allows an attacker to bypass the authentication mechanism and obtain a valid access to the platform.
CVE-2021-40597 1 Edimax 2 Ic-3140w, Ic-3140w Firmware 2022-07-11 10.0 HIGH 9.8 CRITICAL
The firmware of EDIMAX IC-3140W Version 3.11 is hardcoded with Administrator username and password.
CVE-2020-13963 1 Soplanning 1 Soplanning 2022-07-10 7.5 HIGH 9.8 CRITICAL
SOPlanning before 1.47 has Incorrect Access Control because certain secret key information, and the related authentication algorithm, is public. The key for admin is hardcoded in the installation code, and there is no key for publicsp (which is a guest account).
CVE-2020-25256 1 Hyland 1 Onbase 2022-06-30 6.4 MEDIUM 9.1 CRITICAL
An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. PKI certificates have a private key that is the same across different customers' installations.
CVE-2022-28605 3 Apple, Google, Linkplay 3 Iphone Os, Android, Sound Bar 2022-06-30 7.5 HIGH 9.8 CRITICAL
Hardcoded admin token in SoundBar apps in Linkplay SDK 1.00 allows remote attackers to gain admin privilege access in linkplay antifactory
CVE-2020-4854 2 Ibm, Linux 2 Spectrum Protect Plus, Linux Kernel 2022-06-29 7.5 HIGH 9.8 CRITICAL
IBM Spectrum Protect Plus 10.1.0 thorugh 10.1.6 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 190454.
CVE-2022-34005 1 Southrivertech 1 Titan Ftp Server Nextgen 2022-06-29 7.5 HIGH 9.8 CRITICAL
An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation.
CVE-2022-30422 1 Proietti 1 Planet Time Enterprise 2022-06-28 10.0 HIGH 9.8 CRITICAL
Proietti Tech srl Planet Time Enterprise 4.2.0.1,4.2.0.0,4.1.0.0,4.0.0.0,3.3.1.0,3.3.0.0 is vulnerable to Remote code execution via the Viewstate parameter.
CVE-2022-29525 1 Rakuten 1 Casa 2022-06-22 5.0 MEDIUM 9.8 CRITICAL
Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.
CVE-2017-20039 1 Sicunet 1 Access Control 2022-06-17 7.5 HIGH 9.8 CRITICAL
A vulnerability was found in SICUNET Access Controller 0.32-05z. It has been classified as very critical. This affects an unknown part. The manipulation leads to weak authentication. It is possible to initiate the attack remotely.
CVE-2022-30234 1 Schneider-electric 4 Wiser Smart Eer21000, Wiser Smart Eer21000 Firmware, Wiser Smart Eer21001 and 1 more 2022-06-13 10.0 HIGH 9.8 CRITICAL
A CWE-798: Use of Hard-coded Credentials vulnerability exists that could allow arbitrary code to be executed when root level access is obtained. Affected Products: Wiser Smart, EER21000 & EER21001 (V4.5 and prior)
CVE-2022-29730 1 Usr 10 Usr-g800v2, Usr-g800v2 Firmware, Usr-g806 and 7 more 2022-06-10 10.0 HIGH 9.8 CRITICAL
USR IOT 4G LTE Industrial Cellular VPN Router v1.0.36 was discovered to contain hard-coded credentials for its highest privileged account. The credentials cannot be altered through normal operation of the device.
CVE-2022-29186 1 Pagerduty 1 Rundeck 2022-06-08 6.8 MEDIUM 9.8 CRITICAL
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Rundeck community and rundeck-enterprise docker images contained a pre-generated SSH keypair. If the id_rsa.pub public key of the keypair was copied to authorized_keys files on remote host, those hosts would allow access to anyone with the exposed private credentials. This misconfiguration only impacts Rundeck Docker instances of PagerDuty® Process Automation On Prem (formerly Rundeck) version 4.0 and earlier, not Debian, RPM or .WAR. Additionally, the id_rsa.pub file would have to be copied from the Docker image filesystem contents without overwriting it and used to configure SSH access on a host. A patch on Rundeck's `main` branch has removed the pre-generated SSH key pair, but it does not remove exposed keys that have been configured. To patch, users must run a script on hosts in their environment to search for exposed keys and rotate them. Two workarounds are available: Do not use any pre-existing public key file from the rundeck docker images to allow SSH access by adding it to authorized_keys files and, if you have copied the public key file included in the docker image, remove it from any authorized_keys files.
CVE-2013-10002 1 Telecomsoftware 2 Samwin Agent, Samwin Contact Center 2022-06-08 6.4 MEDIUM 9.1 CRITICAL
A vulnerability was found in Telecommunication Software SAMwin Contact Center Suite 5.1. It has been rated as critical. Affected by this issue is the function getCurrentDBVersion in the library SAMwinLIBVB.dll of the credential handler. Authentication is possible with hard-coded credentials. Upgrading to version 6.2 is able to address this issue. It is recommended to upgrade the affected component.