Vulnerability Description
An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints are missing authentication. An attacker is able to view these pages before being authenticated, and some of these pages may disclose sensitive information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Teracue | Enc-400 Hdmi Firmware | <= 2.56 |
| Teracue | Enc-400 Hdmi | - |
| Teracue | Enc-400 Hdmi2 Firmware | <= 2.56 |
| Teracue | Enc-400 Hdmi2 | - |
| Teracue | Enc-400 Hdsdi Firmware | <= 2.56 |
| Teracue | Enc-400 Hdsdi | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-MiThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Feb/48Mailing ListThird Party Advisory
- https://zxsecurity.co.nz/research.htmlNot Applicable
- http://packetstormsecurity.com/files/151802/Teracue-ENC-400-Command-Injection-MiThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Feb/48Mailing ListThird Party Advisory
- https://zxsecurity.co.nz/research.htmlNot Applicable
FAQ
What is CVE-2018-20220?
CVE-2018-20220 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints...
How severe is CVE-2018-20220?
CVE-2018-20220 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20220?
Check the references section above for vendor advisories and patch information. Affected products include: Teracue Enc-400 Hdmi Firmware, Teracue Enc-400 Hdmi, Teracue Enc-400 Hdmi2 Firmware, Teracue Enc-400 Hdmi2, Teracue Enc-400 Hdsdi Firmware.