Vulnerability Description
A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enphase | Envoy | >= 3.0.0, <= 3.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/pudding2/enphase-energy/blob/master/weak_password.txtThird Party Advisory
- https://github.com/pudding2/enphase-energy/blob/master/weak_password_1.pngThird Party Advisory
- https://github.com/pudding2/enphase-energy/blob/master/weak_password_2.pngThird Party Advisory
- https://github.com/pudding2/enphase-energy/blob/master/weak_password.txtThird Party Advisory
- https://github.com/pudding2/enphase-energy/blob/master/weak_password_1.pngThird Party Advisory
- https://github.com/pudding2/enphase-energy/blob/master/weak_password_2.pngThird Party Advisory
FAQ
What is CVE-2019-7676?
CVE-2019-7676 is a vulnerability with a CVSS score of 7.2 (HIGH). A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account.
How severe is CVE-2019-7676?
CVE-2019-7676 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7676?
Check the references section above for vendor advisories and patch information. Affected products include: Enphase Envoy.