HIGH · 7.5

CVE-2018-20220

An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints...

Vulnerability Description

An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints are missing authentication. An attacker is able to view these pages before being authenticated, and some of these pages may disclose sensitive information.

CVSS Score

7.5

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
TeracueEnc-400 Hdmi Firmware<= 2.56
TeracueEnc-400 Hdmi-
TeracueEnc-400 Hdmi2 Firmware<= 2.56
TeracueEnc-400 Hdmi2-
TeracueEnc-400 Hdsdi Firmware<= 2.56
TeracueEnc-400 Hdsdi-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-20220?

CVE-2018-20220 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints...

How severe is CVE-2018-20220?

CVE-2018-20220 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-20220?

Check the references section above for vendor advisories and patch information. Affected products include: Teracue Enc-400 Hdmi Firmware, Teracue Enc-400 Hdmi, Teracue Enc-400 Hdmi2 Firmware, Teracue Enc-400 Hdmi2, Teracue Enc-400 Hdsdi Firmware.