CVE-2020-29380

Published: Nov 29, 2020 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2020-21753 Aliases: GSD-2020-29380
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,9
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
MEDIUM 4,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none

Description

AI Translation Available

An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-the-middle attack on the management of the appliance.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0011
Percentile
0,3th
Updated

EPSS Score Trend (Last 90 Days)

319

Cleartext Transmission of Sensitive Information

Draft
Common Consequences
Security Scopes Affected:
Integrity Confidentiality
Potential Impacts:
Read Application Data Modify Files Or Directories Other
Applicable Platforms
Technologies: Cloud Computing, ICS/OT, Mobile, Not Technology-Specific, System on Chip, Test/Debug Hardware
View CWE Details
522

Insufficiently Protected Credentials

Incomplete
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Gain Privileges Or Assume Identity
Applicable Platforms
Technologies: ICS/OT, Not Technology-Specific, Web Based
View CWE Details
Operating System

V1600G2 Firmware by Vsolcn

cpe:2.3:o:vsolcn:v1600g2_firmware:1.1.4:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

V1600G1 Firmware by Vsolcn

cpe:2.3:o:vsolcn:v1600g1_firmware:2.0.7:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

V1600G1 Firmware by Vsolcn

cpe:2.3:o:vsolcn:v1600g1_firmware:1.9.7:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

V1600D4L Firmware by Vsolcn

cpe:2.3:o:vsolcn:v1600d4l_firmware:1.01.49:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

V1600D Firmware by Vsolcn

cpe:2.3:o:vsolcn:v1600d_firmware:2.03.69:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

V1600D Firmware by Vsolcn

cpe:2.3:o:vsolcn:v1600d_firmware:2.03.57:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

V1600D-Mini Firmware by Vsolcn

cpe:2.3:o:vsolcn:v1600d-mini_firmware:1.01.48:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://seclists.org/fulldisclosure/2020/Jul/14
Mailing List Third Party Advisory
https://seclists.org/fulldisclosure/2020/Jul/14
https://seclists.org/fulldisclosure/2020/Jul/14
Mailing List Third Party Advisory
https://seclists.org/fulldisclosure/2020/Jul/14